system-linux.c 81 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389
  1. /*
  2. * netifd - network interface daemon
  3. * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
  4. * Copyright (C) 2013 Jo-Philipp Wich <jow@openwrt.org>
  5. * Copyright (C) 2013 Steven Barth <steven@midlink.org>
  6. * Copyright (C) 2014 Gioacchino Mazzurco <gio@eigenlab.org>
  7. * Copyright (C) 2017 Matthias Schiffer <mschiffer@universe-factory.net>
  8. * Copyright (C) 2018 Hans Dedecker <dedeckeh@gmail.com>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License version 2
  12. * as published by the Free Software Foundation
  13. *
  14. * This program is distributed in the hope that it will be useful,
  15. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  16. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  17. * GNU General Public License for more details.
  18. */
  19. #define _GNU_SOURCE
  20. #include <sys/socket.h>
  21. #include <sys/ioctl.h>
  22. #include <sys/stat.h>
  23. #include <sys/syscall.h>
  24. #include <net/if.h>
  25. #include <net/if_arp.h>
  26. #include <arpa/inet.h>
  27. #include <netinet/ether.h>
  28. #include <netinet/in.h>
  29. #include <linux/rtnetlink.h>
  30. #include <linux/neighbour.h>
  31. #include <linux/sockios.h>
  32. #include <linux/ip.h>
  33. #include <linux/if_addr.h>
  34. #include <linux/if_link.h>
  35. #include <linux/if_vlan.h>
  36. #include <linux/if_bridge.h>
  37. #include <linux/if_tunnel.h>
  38. #include <linux/ip6_tunnel.h>
  39. #include <linux/ethtool.h>
  40. #include <linux/fib_rules.h>
  41. #include <linux/veth.h>
  42. #include <linux/version.h>
  43. #include <sched.h>
  44. #ifndef RTN_FAILED_POLICY
  45. #define RTN_FAILED_POLICY 12
  46. #endif
  47. #ifndef IFA_F_NOPREFIXROUTE
  48. #define IFA_F_NOPREFIXROUTE 0x200
  49. #endif
  50. #ifndef IFA_FLAGS
  51. #define IFA_FLAGS (IFA_MULTICAST + 1)
  52. #endif
  53. #include <string.h>
  54. #include <fcntl.h>
  55. #include <glob.h>
  56. #include <time.h>
  57. #include <unistd.h>
  58. #include <netlink/msg.h>
  59. #include <netlink/attr.h>
  60. #include <netlink/socket.h>
  61. #include <libubox/uloop.h>
  62. #include "netifd.h"
  63. #include "device.h"
  64. #include "system.h"
  65. struct event_socket {
  66. struct uloop_fd uloop;
  67. struct nl_sock *sock;
  68. int bufsize;
  69. };
  70. static int sock_ioctl = -1;
  71. static struct nl_sock *sock_rtnl = NULL;
  72. static int cb_rtnl_event(struct nl_msg *msg, void *arg);
  73. static void handle_hotplug_event(struct uloop_fd *u, unsigned int events);
  74. static int system_add_proto_tunnel(const char *name, const uint8_t proto,
  75. const unsigned int link, struct blob_attr **tb);
  76. static int __system_del_ip_tunnel(const char *name, struct blob_attr **tb);
  77. static char dev_buf[256];
  78. static void
  79. handler_nl_event(struct uloop_fd *u, unsigned int events)
  80. {
  81. struct event_socket *ev = container_of(u, struct event_socket, uloop);
  82. int err;
  83. socklen_t errlen = sizeof(err);
  84. if (!u->error) {
  85. nl_recvmsgs_default(ev->sock);
  86. return;
  87. }
  88. if (getsockopt(u->fd, SOL_SOCKET, SO_ERROR, (void *)&err, &errlen))
  89. goto abort;
  90. switch(err) {
  91. case ENOBUFS:
  92. /* Increase rx buffer size on netlink socket */
  93. ev->bufsize *= 2;
  94. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  95. goto abort;
  96. /* Request full dump since some info got dropped */
  97. struct rtgenmsg msg = { .rtgen_family = AF_UNSPEC };
  98. nl_send_simple(ev->sock, RTM_GETLINK, NLM_F_DUMP, &msg, sizeof(msg));
  99. break;
  100. default:
  101. goto abort;
  102. }
  103. u->error = false;
  104. return;
  105. abort:
  106. uloop_fd_delete(&ev->uloop);
  107. return;
  108. }
  109. static struct nl_sock *
  110. create_socket(int protocol, int groups)
  111. {
  112. struct nl_sock *sock;
  113. sock = nl_socket_alloc();
  114. if (!sock)
  115. return NULL;
  116. if (groups)
  117. nl_join_groups(sock, groups);
  118. if (nl_connect(sock, protocol)) {
  119. nl_socket_free(sock);
  120. return NULL;
  121. }
  122. return sock;
  123. }
  124. static bool
  125. create_raw_event_socket(struct event_socket *ev, int protocol, int groups,
  126. uloop_fd_handler cb, int flags)
  127. {
  128. ev->sock = create_socket(protocol, groups);
  129. if (!ev->sock)
  130. return false;
  131. ev->uloop.fd = nl_socket_get_fd(ev->sock);
  132. ev->uloop.cb = cb;
  133. if (uloop_fd_add(&ev->uloop, ULOOP_READ|flags))
  134. return false;
  135. return true;
  136. }
  137. static bool
  138. create_event_socket(struct event_socket *ev, int protocol,
  139. int (*cb)(struct nl_msg *msg, void *arg))
  140. {
  141. if (!create_raw_event_socket(ev, protocol, 0, handler_nl_event, ULOOP_ERROR_CB))
  142. return false;
  143. /* Install the valid custom callback handler */
  144. nl_socket_modify_cb(ev->sock, NL_CB_VALID, NL_CB_CUSTOM, cb, NULL);
  145. /* Disable sequence number checking on event sockets */
  146. nl_socket_disable_seq_check(ev->sock);
  147. /* Increase rx buffer size to 65K on event sockets */
  148. ev->bufsize = 65535;
  149. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  150. return false;
  151. return true;
  152. }
  153. static bool
  154. create_hotplug_event_socket(struct event_socket *ev, int protocol,
  155. void (*cb)(struct uloop_fd *u, unsigned int events))
  156. {
  157. if (!create_raw_event_socket(ev, protocol, 1, cb, ULOOP_ERROR_CB))
  158. return false;
  159. /* Increase rx buffer size to 65K on event sockets */
  160. ev->bufsize = 65535;
  161. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  162. return false;
  163. return true;
  164. }
  165. static bool
  166. system_rtn_aton(const char *src, unsigned int *dst)
  167. {
  168. char *e;
  169. unsigned int n;
  170. if (!strcmp(src, "local"))
  171. n = RTN_LOCAL;
  172. else if (!strcmp(src, "nat"))
  173. n = RTN_NAT;
  174. else if (!strcmp(src, "broadcast"))
  175. n = RTN_BROADCAST;
  176. else if (!strcmp(src, "anycast"))
  177. n = RTN_ANYCAST;
  178. else if (!strcmp(src, "multicast"))
  179. n = RTN_MULTICAST;
  180. else if (!strcmp(src, "prohibit"))
  181. n = RTN_PROHIBIT;
  182. else if (!strcmp(src, "unreachable"))
  183. n = RTN_UNREACHABLE;
  184. else if (!strcmp(src, "blackhole"))
  185. n = RTN_BLACKHOLE;
  186. else if (!strcmp(src, "xresolve"))
  187. n = RTN_XRESOLVE;
  188. else if (!strcmp(src, "unicast"))
  189. n = RTN_UNICAST;
  190. else if (!strcmp(src, "throw"))
  191. n = RTN_THROW;
  192. else if (!strcmp(src, "failed_policy"))
  193. n = RTN_FAILED_POLICY;
  194. else {
  195. n = strtoul(src, &e, 0);
  196. if (!e || *e || e == src || n > 255)
  197. return false;
  198. }
  199. *dst = n;
  200. return true;
  201. }
  202. static bool
  203. system_tos_aton(const char *src, unsigned *dst)
  204. {
  205. char *e;
  206. *dst = strtoul(src, &e, 16);
  207. if (e == src || *e || *dst > 255)
  208. return false;
  209. return true;
  210. }
  211. int system_init(void)
  212. {
  213. static struct event_socket rtnl_event;
  214. static struct event_socket hotplug_event;
  215. sock_ioctl = socket(AF_LOCAL, SOCK_DGRAM, 0);
  216. system_fd_set_cloexec(sock_ioctl);
  217. /* Prepare socket for routing / address control */
  218. sock_rtnl = create_socket(NETLINK_ROUTE, 0);
  219. if (!sock_rtnl)
  220. return -1;
  221. if (!create_event_socket(&rtnl_event, NETLINK_ROUTE, cb_rtnl_event))
  222. return -1;
  223. if (!create_hotplug_event_socket(&hotplug_event, NETLINK_KOBJECT_UEVENT,
  224. handle_hotplug_event))
  225. return -1;
  226. /* Receive network link events form kernel */
  227. nl_socket_add_membership(rtnl_event.sock, RTNLGRP_LINK);
  228. return 0;
  229. }
  230. static void system_set_sysctl(const char *path, const char *val)
  231. {
  232. int fd;
  233. fd = open(path, O_WRONLY);
  234. if (fd < 0)
  235. return;
  236. if (write(fd, val, strlen(val))) {}
  237. close(fd);
  238. }
  239. static void system_set_dev_sysctl(const char *path, const char *device, const char *val)
  240. {
  241. snprintf(dev_buf, sizeof(dev_buf), path, device);
  242. system_set_sysctl(dev_buf, val);
  243. }
  244. static void system_set_disable_ipv6(struct device *dev, const char *val)
  245. {
  246. system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/disable_ipv6", dev->ifname, val);
  247. }
  248. static void system_set_rpfilter(struct device *dev, const char *val)
  249. {
  250. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/rp_filter", dev->ifname, val);
  251. }
  252. static void system_set_acceptlocal(struct device *dev, const char *val)
  253. {
  254. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/accept_local", dev->ifname, val);
  255. }
  256. static void system_set_igmpversion(struct device *dev, const char *val)
  257. {
  258. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/force_igmp_version", dev->ifname, val);
  259. }
  260. static void system_set_mldversion(struct device *dev, const char *val)
  261. {
  262. system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/force_mld_version", dev->ifname, val);
  263. }
  264. static void system_set_neigh4reachabletime(struct device *dev, const char *val)
  265. {
  266. system_set_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/base_reachable_time_ms", dev->ifname, val);
  267. }
  268. static void system_set_neigh6reachabletime(struct device *dev, const char *val)
  269. {
  270. system_set_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/base_reachable_time_ms", dev->ifname, val);
  271. }
  272. static void system_set_neigh4gcstaletime(struct device *dev, const char *val)
  273. {
  274. system_set_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/gc_stale_time", dev->ifname, val);
  275. }
  276. static void system_set_neigh6gcstaletime(struct device *dev, const char *val)
  277. {
  278. system_set_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/gc_stale_time", dev->ifname, val);
  279. }
  280. static void system_set_neigh4locktime(struct device *dev, const char *val)
  281. {
  282. system_set_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/locktime", dev->ifname, val);
  283. }
  284. static void system_set_dadtransmits(struct device *dev, const char *val)
  285. {
  286. system_set_dev_sysctl("/proc/sys/net/ipv6/conf/%s/dad_transmits", dev->ifname, val);
  287. }
  288. static void system_bridge_set_multicast_to_unicast(struct device *dev, const char *val)
  289. {
  290. system_set_dev_sysctl("/sys/class/net/%s/brport/multicast_to_unicast", dev->ifname, val);
  291. }
  292. static void system_bridge_set_multicast_fast_leave(struct device *dev, const char *val)
  293. {
  294. system_set_dev_sysctl("/sys/class/net/%s/brport/multicast_fast_leave", dev->ifname, val);
  295. }
  296. static void system_bridge_set_hairpin_mode(struct device *dev, const char *val)
  297. {
  298. system_set_dev_sysctl("/sys/class/net/%s/brport/hairpin_mode", dev->ifname, val);
  299. }
  300. static void system_bridge_set_isolated(struct device *dev, const char *val)
  301. {
  302. system_set_dev_sysctl("/sys/class/net/%s/brport/isolated", dev->ifname, val);
  303. }
  304. static void system_bridge_set_multicast_router(struct device *dev, const char *val, bool bridge)
  305. {
  306. system_set_dev_sysctl(bridge ? "/sys/class/net/%s/bridge/multicast_router" :
  307. "/sys/class/net/%s/brport/multicast_router",
  308. dev->ifname, val);
  309. }
  310. static void system_bridge_set_robustness(struct device *dev, const char *val)
  311. {
  312. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_startup_query_count",
  313. dev->ifname, val);
  314. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_last_member_count",
  315. dev->ifname, val);
  316. }
  317. static void system_bridge_set_query_interval(struct device *dev, const char *val)
  318. {
  319. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_query_interval",
  320. dev->ifname, val);
  321. }
  322. static void system_bridge_set_query_response_interval(struct device *dev, const char *val)
  323. {
  324. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_query_response_interval",
  325. dev->ifname, val);
  326. }
  327. static void system_bridge_set_last_member_interval(struct device *dev, const char *val)
  328. {
  329. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_last_member_interval",
  330. dev->ifname, val);
  331. }
  332. static void system_bridge_set_membership_interval(struct device *dev, const char *val)
  333. {
  334. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_membership_interval",
  335. dev->ifname, val);
  336. }
  337. static void system_bridge_set_other_querier_timeout(struct device *dev, const char *val)
  338. {
  339. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_querier_interval",
  340. dev->ifname, val);
  341. }
  342. static void system_bridge_set_startup_query_interval(struct device *dev, const char *val)
  343. {
  344. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_startup_query_interval",
  345. dev->ifname, val);
  346. }
  347. static void system_bridge_set_stp_state(struct device *dev, const char *val)
  348. {
  349. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/stp_state", dev->ifname, val);
  350. }
  351. static void system_bridge_set_forward_delay(struct device *dev, const char *val)
  352. {
  353. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/forward_delay", dev->ifname, val);
  354. }
  355. static void system_bridge_set_priority(struct device *dev, const char *val)
  356. {
  357. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/priority", dev->ifname, val);
  358. }
  359. static void system_bridge_set_ageing_time(struct device *dev, const char *val)
  360. {
  361. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/ageing_time", dev->ifname, val);
  362. }
  363. static void system_bridge_set_hello_time(struct device *dev, const char *val)
  364. {
  365. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/hello_time", dev->ifname, val);
  366. }
  367. static void system_bridge_set_max_age(struct device *dev, const char *val)
  368. {
  369. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/max_age", dev->ifname, val);
  370. }
  371. static void system_bridge_set_learning(struct device *dev, const char *val)
  372. {
  373. system_set_dev_sysctl("/sys/class/net/%s/brport/learning", dev->ifname, val);
  374. }
  375. static void system_bridge_set_unicast_flood(struct device *dev, const char *val)
  376. {
  377. system_set_dev_sysctl("/sys/class/net/%s/brport/unicast_flood", dev->ifname, val);
  378. }
  379. static void system_set_sendredirects(struct device *dev, const char *val)
  380. {
  381. system_set_dev_sysctl("/proc/sys/net/ipv4/conf/%s/send_redirects", dev->ifname, val);
  382. }
  383. static int system_get_sysctl(const char *path, char *buf, const size_t buf_sz)
  384. {
  385. int fd = -1, ret = -1;
  386. fd = open(path, O_RDONLY);
  387. if (fd < 0)
  388. goto out;
  389. ssize_t len = read(fd, buf, buf_sz - 1);
  390. if (len < 0)
  391. goto out;
  392. ret = buf[len] = 0;
  393. out:
  394. if (fd >= 0)
  395. close(fd);
  396. return ret;
  397. }
  398. static int
  399. system_get_dev_sysctl(const char *path, const char *device, char *buf, const size_t buf_sz)
  400. {
  401. snprintf(dev_buf, sizeof(dev_buf), path, device);
  402. return system_get_sysctl(dev_buf, buf, buf_sz);
  403. }
  404. static int system_get_disable_ipv6(struct device *dev, char *buf, const size_t buf_sz)
  405. {
  406. return system_get_dev_sysctl("/proc/sys/net/ipv6/conf/%s/disable_ipv6",
  407. dev->ifname, buf, buf_sz);
  408. }
  409. static int system_get_rpfilter(struct device *dev, char *buf, const size_t buf_sz)
  410. {
  411. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/rp_filter",
  412. dev->ifname, buf, buf_sz);
  413. }
  414. static int system_get_acceptlocal(struct device *dev, char *buf, const size_t buf_sz)
  415. {
  416. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/accept_local",
  417. dev->ifname, buf, buf_sz);
  418. }
  419. static int system_get_igmpversion(struct device *dev, char *buf, const size_t buf_sz)
  420. {
  421. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/force_igmp_version",
  422. dev->ifname, buf, buf_sz);
  423. }
  424. static int system_get_mldversion(struct device *dev, char *buf, const size_t buf_sz)
  425. {
  426. return system_get_dev_sysctl("/proc/sys/net/ipv6/conf/%s/force_mld_version",
  427. dev->ifname, buf, buf_sz);
  428. }
  429. static int system_get_neigh4reachabletime(struct device *dev, char *buf, const size_t buf_sz)
  430. {
  431. return system_get_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/base_reachable_time_ms",
  432. dev->ifname, buf, buf_sz);
  433. }
  434. static int system_get_neigh6reachabletime(struct device *dev, char *buf, const size_t buf_sz)
  435. {
  436. return system_get_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/base_reachable_time_ms",
  437. dev->ifname, buf, buf_sz);
  438. }
  439. static int system_get_neigh4gcstaletime(struct device *dev, char *buf, const size_t buf_sz)
  440. {
  441. return system_get_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/gc_stale_time",
  442. dev->ifname, buf, buf_sz);
  443. }
  444. static int system_get_neigh6gcstaletime(struct device *dev, char *buf, const size_t buf_sz)
  445. {
  446. return system_get_dev_sysctl("/proc/sys/net/ipv6/neigh/%s/gc_stale_time",
  447. dev->ifname, buf, buf_sz);
  448. }
  449. static int system_get_neigh4locktime(struct device *dev, char *buf, const size_t buf_sz)
  450. {
  451. return system_get_dev_sysctl("/proc/sys/net/ipv4/neigh/%s/locktime",
  452. dev->ifname, buf, buf_sz);
  453. }
  454. static int system_get_dadtransmits(struct device *dev, char *buf, const size_t buf_sz)
  455. {
  456. return system_get_dev_sysctl("/proc/sys/net/ipv6/conf/%s/dad_transmits",
  457. dev->ifname, buf, buf_sz);
  458. }
  459. static int system_get_sendredirects(struct device *dev, char *buf, const size_t buf_sz)
  460. {
  461. return system_get_dev_sysctl("/proc/sys/net/ipv4/conf/%s/send_redirects",
  462. dev->ifname, buf, buf_sz);
  463. }
  464. /* Evaluate netlink messages */
  465. static int cb_rtnl_event(struct nl_msg *msg, void *arg)
  466. {
  467. struct nlmsghdr *nh = nlmsg_hdr(msg);
  468. struct nlattr *nla[__IFLA_MAX];
  469. int link_state = 0;
  470. char buf[10];
  471. if (nh->nlmsg_type != RTM_NEWLINK)
  472. goto out;
  473. nlmsg_parse(nh, sizeof(struct ifinfomsg), nla, __IFLA_MAX - 1, NULL);
  474. if (!nla[IFLA_IFNAME])
  475. goto out;
  476. struct device *dev = device_find(nla_data(nla[IFLA_IFNAME]));
  477. if (!dev)
  478. goto out;
  479. if (!system_get_dev_sysctl("/sys/class/net/%s/carrier", dev->ifname, buf, sizeof(buf)))
  480. link_state = strtoul(buf, NULL, 0);
  481. device_set_link(dev, link_state ? true : false);
  482. out:
  483. return 0;
  484. }
  485. static void
  486. handle_hotplug_msg(char *data, int size)
  487. {
  488. const char *subsystem = NULL, *interface = NULL, *interface_old = NULL;
  489. char *cur, *end, *sep;
  490. struct device *dev;
  491. int skip;
  492. bool add, move = false;
  493. if (!strncmp(data, "add@", 4))
  494. add = true;
  495. else if (!strncmp(data, "remove@", 7))
  496. add = false;
  497. else if (!strncmp(data, "move@", 5)) {
  498. add = true;
  499. move = true;
  500. }
  501. else
  502. return;
  503. skip = strlen(data) + 1;
  504. end = data + size;
  505. for (cur = data + skip; cur < end; cur += skip) {
  506. skip = strlen(cur) + 1;
  507. sep = strchr(cur, '=');
  508. if (!sep)
  509. continue;
  510. *sep = 0;
  511. if (!strcmp(cur, "INTERFACE"))
  512. interface = sep + 1;
  513. else if (!strcmp(cur, "SUBSYSTEM")) {
  514. subsystem = sep + 1;
  515. if (strcmp(subsystem, "net") != 0)
  516. return;
  517. } else if (!strcmp(cur, "DEVPATH_OLD")) {
  518. interface_old = strrchr(sep + 1, '/');
  519. if (interface_old)
  520. interface_old++;
  521. }
  522. }
  523. if (subsystem && interface) {
  524. if (move && interface_old)
  525. goto move;
  526. else
  527. goto found;
  528. }
  529. return;
  530. move:
  531. dev = device_find(interface_old);
  532. if (!dev)
  533. goto found;
  534. if (dev->type != &simple_device_type)
  535. goto found;
  536. device_set_present(dev, false);
  537. found:
  538. dev = device_find(interface);
  539. if (!dev)
  540. return;
  541. if (dev->type != &simple_device_type)
  542. return;
  543. if (add && system_if_force_external(dev->ifname))
  544. return;
  545. device_set_present(dev, add);
  546. }
  547. static void
  548. handle_hotplug_event(struct uloop_fd *u, unsigned int events)
  549. {
  550. struct event_socket *ev = container_of(u, struct event_socket, uloop);
  551. struct sockaddr_nl nla;
  552. unsigned char *buf = NULL;
  553. int size;
  554. int err;
  555. socklen_t errlen = sizeof(err);
  556. if (!u->error) {
  557. while ((size = nl_recv(ev->sock, &nla, &buf, NULL)) > 0) {
  558. if (nla.nl_pid == 0)
  559. handle_hotplug_msg((char *) buf, size);
  560. free(buf);
  561. }
  562. return;
  563. }
  564. if (getsockopt(u->fd, SOL_SOCKET, SO_ERROR, (void *)&err, &errlen))
  565. goto abort;
  566. switch(err) {
  567. case ENOBUFS:
  568. /* Increase rx buffer size on netlink socket */
  569. ev->bufsize *= 2;
  570. if (nl_socket_set_buffer_size(ev->sock, ev->bufsize, 0))
  571. goto abort;
  572. break;
  573. default:
  574. goto abort;
  575. }
  576. u->error = false;
  577. return;
  578. abort:
  579. uloop_fd_delete(&ev->uloop);
  580. return;
  581. }
  582. static int system_rtnl_call(struct nl_msg *msg)
  583. {
  584. int ret;
  585. ret = nl_send_auto_complete(sock_rtnl, msg);
  586. nlmsg_free(msg);
  587. if (ret < 0)
  588. return ret;
  589. return nl_wait_for_ack(sock_rtnl);
  590. }
  591. int system_bridge_delbr(struct device *bridge)
  592. {
  593. return ioctl(sock_ioctl, SIOCBRDELBR, bridge->ifname);
  594. }
  595. static int system_bridge_if(const char *bridge, struct device *dev, int cmd, void *data)
  596. {
  597. struct ifreq ifr;
  598. memset(&ifr, 0, sizeof(ifr));
  599. if (dev)
  600. ifr.ifr_ifindex = dev->ifindex;
  601. else
  602. ifr.ifr_data = data;
  603. strncpy(ifr.ifr_name, bridge, sizeof(ifr.ifr_name) - 1);
  604. return ioctl(sock_ioctl, cmd, &ifr);
  605. }
  606. static bool system_is_bridge(const char *name, char *buf, int buflen)
  607. {
  608. struct stat st;
  609. snprintf(buf, buflen, "/sys/devices/virtual/net/%s/bridge", name);
  610. if (stat(buf, &st) < 0)
  611. return false;
  612. return true;
  613. }
  614. static char *system_get_bridge(const char *name, char *buf, int buflen)
  615. {
  616. char *path;
  617. ssize_t len = -1;
  618. glob_t gl;
  619. snprintf(buf, buflen, "/sys/devices/virtual/net/*/brif/%s/bridge", name);
  620. if (glob(buf, GLOB_NOSORT, NULL, &gl) < 0)
  621. return NULL;
  622. if (gl.gl_pathc > 0)
  623. len = readlink(gl.gl_pathv[0], buf, buflen);
  624. globfree(&gl);
  625. if (len < 0)
  626. return NULL;
  627. buf[len] = 0;
  628. path = strrchr(buf, '/');
  629. if (!path)
  630. return NULL;
  631. return path + 1;
  632. }
  633. static void
  634. system_bridge_set_wireless(struct device *bridge, struct device *dev)
  635. {
  636. bool mcast_to_ucast = dev->wireless_ap;
  637. bool hairpin = true;
  638. if (bridge->settings.flags & DEV_OPT_MULTICAST_TO_UNICAST &&
  639. !bridge->settings.multicast_to_unicast)
  640. mcast_to_ucast = false;
  641. if (!mcast_to_ucast || dev->wireless_isolate)
  642. hairpin = false;
  643. system_bridge_set_multicast_to_unicast(dev, mcast_to_ucast ? "1" : "0");
  644. system_bridge_set_hairpin_mode(dev, hairpin ? "1" : "0");
  645. }
  646. int system_bridge_addif(struct device *bridge, struct device *dev)
  647. {
  648. char buf[64];
  649. char *oldbr;
  650. int ret = 0;
  651. oldbr = system_get_bridge(dev->ifname, dev_buf, sizeof(dev_buf));
  652. if (!oldbr || strcmp(oldbr, bridge->ifname) != 0)
  653. ret = system_bridge_if(bridge->ifname, dev, SIOCBRADDIF, NULL);
  654. if (dev->wireless)
  655. system_bridge_set_wireless(bridge, dev);
  656. if (dev->settings.flags & DEV_OPT_MULTICAST_ROUTER) {
  657. snprintf(buf, sizeof(buf), "%u", dev->settings.multicast_router);
  658. system_bridge_set_multicast_router(dev, buf, false);
  659. }
  660. if (dev->settings.flags & DEV_OPT_MULTICAST_FAST_LEAVE &&
  661. dev->settings.multicast_fast_leave)
  662. system_bridge_set_multicast_fast_leave(dev, "1");
  663. if (dev->settings.flags & DEV_OPT_LEARNING &&
  664. !dev->settings.learning)
  665. system_bridge_set_learning(dev, "0");
  666. if (dev->settings.flags & DEV_OPT_UNICAST_FLOOD &&
  667. !dev->settings.unicast_flood)
  668. system_bridge_set_unicast_flood(dev, "0");
  669. if (dev->settings.flags & DEV_OPT_ISOLATE &&
  670. dev->settings.isolate)
  671. system_bridge_set_isolated(dev, "1");
  672. return ret;
  673. }
  674. int system_bridge_delif(struct device *bridge, struct device *dev)
  675. {
  676. return system_bridge_if(bridge->ifname, dev, SIOCBRDELIF, NULL);
  677. }
  678. int system_if_resolve(struct device *dev)
  679. {
  680. struct ifreq ifr;
  681. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  682. if (!ioctl(sock_ioctl, SIOCGIFINDEX, &ifr))
  683. return ifr.ifr_ifindex;
  684. else
  685. return 0;
  686. }
  687. static int system_if_flags(const char *ifname, unsigned add, unsigned rem)
  688. {
  689. struct ifreq ifr;
  690. memset(&ifr, 0, sizeof(ifr));
  691. strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name) - 1);
  692. if (ioctl(sock_ioctl, SIOCGIFFLAGS, &ifr) < 0)
  693. return -1;
  694. ifr.ifr_flags |= add;
  695. ifr.ifr_flags &= ~rem;
  696. return ioctl(sock_ioctl, SIOCSIFFLAGS, &ifr);
  697. }
  698. struct clear_data {
  699. struct nl_msg *msg;
  700. struct device *dev;
  701. int type;
  702. int size;
  703. int af;
  704. };
  705. static bool check_ifaddr(struct nlmsghdr *hdr, int ifindex)
  706. {
  707. struct ifaddrmsg *ifa = NLMSG_DATA(hdr);
  708. return ifa->ifa_index == ifindex;
  709. }
  710. static bool check_route(struct nlmsghdr *hdr, int ifindex)
  711. {
  712. struct rtmsg *r = NLMSG_DATA(hdr);
  713. struct nlattr *tb[__RTA_MAX];
  714. if (r->rtm_protocol == RTPROT_KERNEL &&
  715. r->rtm_family == AF_INET6)
  716. return false;
  717. nlmsg_parse(hdr, sizeof(struct rtmsg), tb, __RTA_MAX - 1, NULL);
  718. if (!tb[RTA_OIF])
  719. return false;
  720. return *(int *)RTA_DATA(tb[RTA_OIF]) == ifindex;
  721. }
  722. static bool check_rule(struct nlmsghdr *hdr, int ifindex)
  723. {
  724. return true;
  725. }
  726. static int cb_clear_event(struct nl_msg *msg, void *arg)
  727. {
  728. struct clear_data *clr = arg;
  729. struct nlmsghdr *hdr = nlmsg_hdr(msg);
  730. bool (*cb)(struct nlmsghdr *, int ifindex);
  731. int type, ret;
  732. switch(clr->type) {
  733. case RTM_GETADDR:
  734. type = RTM_DELADDR;
  735. if (hdr->nlmsg_type != RTM_NEWADDR)
  736. return NL_SKIP;
  737. cb = check_ifaddr;
  738. break;
  739. case RTM_GETROUTE:
  740. type = RTM_DELROUTE;
  741. if (hdr->nlmsg_type != RTM_NEWROUTE)
  742. return NL_SKIP;
  743. cb = check_route;
  744. break;
  745. case RTM_GETRULE:
  746. type = RTM_DELRULE;
  747. if (hdr->nlmsg_type != RTM_NEWRULE)
  748. return NL_SKIP;
  749. cb = check_rule;
  750. break;
  751. default:
  752. return NL_SKIP;
  753. }
  754. if (!cb(hdr, clr->dev ? clr->dev->ifindex : 0))
  755. return NL_SKIP;
  756. if (type == RTM_DELRULE)
  757. D(SYSTEM, "Remove a rule\n");
  758. else
  759. D(SYSTEM, "Remove %s from device %s\n",
  760. type == RTM_DELADDR ? "an address" : "a route",
  761. clr->dev->ifname);
  762. memcpy(nlmsg_hdr(clr->msg), hdr, hdr->nlmsg_len);
  763. hdr = nlmsg_hdr(clr->msg);
  764. hdr->nlmsg_type = type;
  765. hdr->nlmsg_flags = NLM_F_REQUEST;
  766. nl_socket_disable_auto_ack(sock_rtnl);
  767. ret = nl_send_auto_complete(sock_rtnl, clr->msg);
  768. if (ret < 0) {
  769. if (type == RTM_DELRULE)
  770. D(SYSTEM, "Error deleting a rule: %d\n", ret);
  771. else
  772. D(SYSTEM, "Error deleting %s from device '%s': %d\n",
  773. type == RTM_DELADDR ? "an address" : "a route",
  774. clr->dev->ifname, ret);
  775. }
  776. nl_socket_enable_auto_ack(sock_rtnl);
  777. return NL_SKIP;
  778. }
  779. static int
  780. cb_finish_event(struct nl_msg *msg, void *arg)
  781. {
  782. int *pending = arg;
  783. *pending = 0;
  784. return NL_STOP;
  785. }
  786. static int
  787. error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err, void *arg)
  788. {
  789. int *pending = arg;
  790. *pending = err->error;
  791. return NL_STOP;
  792. }
  793. static void
  794. system_if_clear_entries(struct device *dev, int type, int af)
  795. {
  796. struct clear_data clr;
  797. struct nl_cb *cb;
  798. struct rtmsg rtm = {
  799. .rtm_family = af,
  800. .rtm_flags = RTM_F_CLONED,
  801. };
  802. int flags = NLM_F_DUMP;
  803. int pending = 1;
  804. clr.af = af;
  805. clr.dev = dev;
  806. clr.type = type;
  807. switch (type) {
  808. case RTM_GETADDR:
  809. case RTM_GETRULE:
  810. clr.size = sizeof(struct rtgenmsg);
  811. break;
  812. case RTM_GETROUTE:
  813. clr.size = sizeof(struct rtmsg);
  814. break;
  815. default:
  816. return;
  817. }
  818. cb = nl_cb_alloc(NL_CB_DEFAULT);
  819. if (!cb)
  820. return;
  821. clr.msg = nlmsg_alloc_simple(type, flags);
  822. if (!clr.msg)
  823. goto out;
  824. nlmsg_append(clr.msg, &rtm, clr.size, 0);
  825. nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, cb_clear_event, &clr);
  826. nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, cb_finish_event, &pending);
  827. nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &pending);
  828. if (nl_send_auto_complete(sock_rtnl, clr.msg) < 0)
  829. goto free;
  830. while (pending > 0)
  831. nl_recvmsgs(sock_rtnl, cb);
  832. free:
  833. nlmsg_free(clr.msg);
  834. out:
  835. nl_cb_put(cb);
  836. }
  837. /*
  838. * Clear bridge (membership) state and bring down device
  839. */
  840. void system_if_clear_state(struct device *dev)
  841. {
  842. static char buf[256];
  843. char *bridge;
  844. device_set_ifindex(dev, system_if_resolve(dev));
  845. if (dev->external || !dev->ifindex)
  846. return;
  847. system_if_flags(dev->ifname, 0, IFF_UP);
  848. if (system_is_bridge(dev->ifname, buf, sizeof(buf))) {
  849. D(SYSTEM, "Delete existing bridge named '%s'\n", dev->ifname);
  850. system_bridge_delbr(dev);
  851. return;
  852. }
  853. bridge = system_get_bridge(dev->ifname, buf, sizeof(buf));
  854. if (bridge) {
  855. D(SYSTEM, "Remove device '%s' from bridge '%s'\n", dev->ifname, bridge);
  856. system_bridge_if(bridge, dev, SIOCBRDELIF, NULL);
  857. }
  858. system_if_clear_entries(dev, RTM_GETROUTE, AF_INET);
  859. system_if_clear_entries(dev, RTM_GETADDR, AF_INET);
  860. system_if_clear_entries(dev, RTM_GETROUTE, AF_INET6);
  861. system_if_clear_entries(dev, RTM_GETADDR, AF_INET6);
  862. system_if_clear_entries(dev, RTM_GETNEIGH, AF_INET);
  863. system_if_clear_entries(dev, RTM_GETNEIGH, AF_INET6);
  864. system_set_disable_ipv6(dev, "0");
  865. }
  866. static inline unsigned long
  867. sec_to_jiffies(int val)
  868. {
  869. return (unsigned long) val * 100;
  870. }
  871. static void system_bridge_conf_multicast_deps(struct device *bridge,
  872. struct bridge_config *cfg,
  873. char *buf,
  874. int buf_len)
  875. {
  876. int val;
  877. if (cfg->flags & BRIDGE_OPT_ROBUSTNESS ||
  878. cfg->flags & BRIDGE_OPT_QUERY_INTERVAL ||
  879. cfg->flags & BRIDGE_OPT_QUERY_RESPONSE_INTERVAL) {
  880. val = cfg->robustness * cfg->query_interval +
  881. cfg->query_response_interval;
  882. snprintf(buf, buf_len, "%i", val);
  883. system_bridge_set_membership_interval(bridge, buf);
  884. val = cfg->robustness * cfg->query_interval +
  885. cfg->query_response_interval / 2;
  886. snprintf(buf, buf_len, "%i", val);
  887. system_bridge_set_other_querier_timeout(bridge, buf);
  888. }
  889. if (cfg->flags & BRIDGE_OPT_QUERY_INTERVAL) {
  890. val = cfg->query_interval / 4;
  891. snprintf(buf, buf_len, "%i", val);
  892. system_bridge_set_startup_query_interval(bridge, buf);
  893. }
  894. }
  895. static void system_bridge_conf_multicast(struct device *bridge,
  896. struct bridge_config *cfg,
  897. char *buf,
  898. int buf_len)
  899. {
  900. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_snooping",
  901. bridge->ifname, cfg->igmp_snoop ? "1" : "0");
  902. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/multicast_querier",
  903. bridge->ifname, cfg->multicast_querier ? "1" : "0");
  904. snprintf(buf, buf_len, "%i", cfg->hash_max);
  905. system_set_dev_sysctl("/sys/devices/virtual/net/%s/bridge/hash_max",
  906. bridge->ifname, buf);
  907. if (bridge->settings.flags & DEV_OPT_MULTICAST_ROUTER) {
  908. snprintf(buf, buf_len, "%u", bridge->settings.multicast_router);
  909. system_bridge_set_multicast_router(bridge, buf, true);
  910. }
  911. if (cfg->flags & BRIDGE_OPT_ROBUSTNESS) {
  912. snprintf(buf, buf_len, "%i", cfg->robustness);
  913. system_bridge_set_robustness(bridge, buf);
  914. }
  915. if (cfg->flags & BRIDGE_OPT_QUERY_INTERVAL) {
  916. snprintf(buf, buf_len, "%i", cfg->query_interval);
  917. system_bridge_set_query_interval(bridge, buf);
  918. }
  919. if (cfg->flags & BRIDGE_OPT_QUERY_RESPONSE_INTERVAL) {
  920. snprintf(buf, buf_len, "%i", cfg->query_response_interval);
  921. system_bridge_set_query_response_interval(bridge, buf);
  922. }
  923. if (cfg->flags & BRIDGE_OPT_LAST_MEMBER_INTERVAL) {
  924. snprintf(buf, buf_len, "%i", cfg->last_member_interval);
  925. system_bridge_set_last_member_interval(bridge, buf);
  926. }
  927. system_bridge_conf_multicast_deps(bridge, cfg, buf, buf_len);
  928. }
  929. int system_bridge_addbr(struct device *bridge, struct bridge_config *cfg)
  930. {
  931. char buf[64];
  932. if (ioctl(sock_ioctl, SIOCBRADDBR, bridge->ifname) < 0)
  933. return -1;
  934. system_bridge_set_stp_state(bridge, cfg->stp ? "1" : "0");
  935. snprintf(buf, sizeof(buf), "%lu", sec_to_jiffies(cfg->forward_delay));
  936. system_bridge_set_forward_delay(bridge, buf);
  937. system_bridge_conf_multicast(bridge, cfg, buf, sizeof(buf));
  938. snprintf(buf, sizeof(buf), "%d", cfg->priority);
  939. system_bridge_set_priority(bridge, buf);
  940. if (cfg->flags & BRIDGE_OPT_AGEING_TIME) {
  941. snprintf(buf, sizeof(buf), "%lu", sec_to_jiffies(cfg->ageing_time));
  942. system_bridge_set_ageing_time(bridge, buf);
  943. }
  944. if (cfg->flags & BRIDGE_OPT_HELLO_TIME) {
  945. snprintf(buf, sizeof(buf), "%lu", sec_to_jiffies(cfg->hello_time));
  946. system_bridge_set_hello_time(bridge, buf);
  947. }
  948. if (cfg->flags & BRIDGE_OPT_MAX_AGE) {
  949. snprintf(buf, sizeof(buf), "%lu", sec_to_jiffies(cfg->max_age));
  950. system_bridge_set_max_age(bridge, buf);
  951. }
  952. return 0;
  953. }
  954. int system_macvlan_add(struct device *macvlan, struct device *dev, struct macvlan_config *cfg)
  955. {
  956. struct nl_msg *msg;
  957. struct nlattr *linkinfo, *data;
  958. struct ifinfomsg iim = { .ifi_family = AF_UNSPEC, };
  959. int i, rv;
  960. static const struct {
  961. const char *name;
  962. enum macvlan_mode val;
  963. } modes[] = {
  964. { "private", MACVLAN_MODE_PRIVATE },
  965. { "vepa", MACVLAN_MODE_VEPA },
  966. { "bridge", MACVLAN_MODE_BRIDGE },
  967. { "passthru", MACVLAN_MODE_PASSTHRU },
  968. };
  969. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  970. if (!msg)
  971. return -1;
  972. nlmsg_append(msg, &iim, sizeof(iim), 0);
  973. if (cfg->flags & MACVLAN_OPT_MACADDR)
  974. nla_put(msg, IFLA_ADDRESS, sizeof(cfg->macaddr), cfg->macaddr);
  975. nla_put_string(msg, IFLA_IFNAME, macvlan->ifname);
  976. nla_put_u32(msg, IFLA_LINK, dev->ifindex);
  977. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO)))
  978. goto nla_put_failure;
  979. nla_put_string(msg, IFLA_INFO_KIND, "macvlan");
  980. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA)))
  981. goto nla_put_failure;
  982. if (cfg->mode) {
  983. for (i = 0; i < ARRAY_SIZE(modes); i++) {
  984. if (strcmp(cfg->mode, modes[i].name) != 0)
  985. continue;
  986. nla_put_u32(msg, IFLA_MACVLAN_MODE, modes[i].val);
  987. break;
  988. }
  989. }
  990. nla_nest_end(msg, data);
  991. nla_nest_end(msg, linkinfo);
  992. rv = system_rtnl_call(msg);
  993. if (rv)
  994. D(SYSTEM, "Error adding macvlan '%s' over '%s': %d\n", macvlan->ifname, dev->ifname, rv);
  995. return rv;
  996. nla_put_failure:
  997. nlmsg_free(msg);
  998. return -ENOMEM;
  999. }
  1000. int system_link_netns_move(const char *ifname, int netns_fd)
  1001. {
  1002. struct nl_msg *msg;
  1003. struct ifinfomsg iim = {
  1004. .ifi_family = AF_UNSPEC,
  1005. .ifi_index = 0,
  1006. };
  1007. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST);
  1008. if (!msg)
  1009. return -1;
  1010. nlmsg_append(msg, &iim, sizeof(iim), 0);
  1011. nla_put_string(msg, IFLA_IFNAME, ifname);
  1012. nla_put_u32(msg, IFLA_NET_NS_FD, netns_fd);
  1013. return system_rtnl_call(msg);
  1014. }
  1015. static int system_link_del(const char *ifname)
  1016. {
  1017. struct nl_msg *msg;
  1018. struct ifinfomsg iim = {
  1019. .ifi_family = AF_UNSPEC,
  1020. .ifi_index = 0,
  1021. };
  1022. msg = nlmsg_alloc_simple(RTM_DELLINK, NLM_F_REQUEST);
  1023. if (!msg)
  1024. return -1;
  1025. nlmsg_append(msg, &iim, sizeof(iim), 0);
  1026. nla_put_string(msg, IFLA_IFNAME, ifname);
  1027. return system_rtnl_call(msg);
  1028. }
  1029. int system_macvlan_del(struct device *macvlan)
  1030. {
  1031. return system_link_del(macvlan->ifname);
  1032. }
  1033. int system_netns_open(const pid_t target_ns)
  1034. {
  1035. char pid_net_path[PATH_MAX];
  1036. snprintf(pid_net_path, sizeof(pid_net_path), "/proc/%u/ns/net", target_ns);
  1037. return open(pid_net_path, O_RDONLY);
  1038. }
  1039. int system_netns_set(int netns_fd)
  1040. {
  1041. return setns(netns_fd, CLONE_NEWNET);
  1042. }
  1043. int system_veth_add(struct device *veth, struct veth_config *cfg)
  1044. {
  1045. struct nl_msg *msg;
  1046. struct ifinfomsg empty_iim = {};
  1047. struct nlattr *linkinfo, *data, *veth_info;
  1048. int rv;
  1049. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  1050. if (!msg)
  1051. return -1;
  1052. nlmsg_append(msg, &empty_iim, sizeof(empty_iim), 0);
  1053. if (cfg->flags & VETH_OPT_MACADDR)
  1054. nla_put(msg, IFLA_ADDRESS, sizeof(cfg->macaddr), cfg->macaddr);
  1055. nla_put_string(msg, IFLA_IFNAME, veth->ifname);
  1056. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO)))
  1057. goto nla_put_failure;
  1058. nla_put_string(msg, IFLA_INFO_KIND, "veth");
  1059. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA)))
  1060. goto nla_put_failure;
  1061. if (!(veth_info = nla_nest_start(msg, VETH_INFO_PEER)))
  1062. goto nla_put_failure;
  1063. nlmsg_append(msg, &empty_iim, sizeof(empty_iim), 0);
  1064. if (cfg->flags & VETH_OPT_PEER_NAME)
  1065. nla_put_string(msg, IFLA_IFNAME, cfg->peer_name);
  1066. if (cfg->flags & VETH_OPT_PEER_MACADDR)
  1067. nla_put(msg, IFLA_ADDRESS, sizeof(cfg->peer_macaddr), cfg->peer_macaddr);
  1068. nla_nest_end(msg, veth_info);
  1069. nla_nest_end(msg, data);
  1070. nla_nest_end(msg, linkinfo);
  1071. rv = system_rtnl_call(msg);
  1072. if (rv) {
  1073. if (cfg->flags & VETH_OPT_PEER_NAME)
  1074. D(SYSTEM, "Error adding veth '%s' with peer '%s': %d\n", veth->ifname, cfg->peer_name, rv);
  1075. else
  1076. D(SYSTEM, "Error adding veth '%s': %d\n", veth->ifname, rv);
  1077. }
  1078. return rv;
  1079. nla_put_failure:
  1080. nlmsg_free(msg);
  1081. return -ENOMEM;
  1082. }
  1083. int system_veth_del(struct device *veth)
  1084. {
  1085. return system_link_del(veth->ifname);
  1086. }
  1087. static int system_vlan(struct device *dev, int id)
  1088. {
  1089. struct vlan_ioctl_args ifr = {
  1090. .cmd = SET_VLAN_NAME_TYPE_CMD,
  1091. .u.name_type = VLAN_NAME_TYPE_RAW_PLUS_VID_NO_PAD,
  1092. };
  1093. if (ioctl(sock_ioctl, SIOCSIFVLAN, &ifr) < 0)
  1094. return -1;
  1095. if (id < 0) {
  1096. ifr.cmd = DEL_VLAN_CMD;
  1097. ifr.u.VID = 0;
  1098. } else {
  1099. ifr.cmd = ADD_VLAN_CMD;
  1100. ifr.u.VID = id;
  1101. }
  1102. strncpy(ifr.device1, dev->ifname, sizeof(ifr.device1));
  1103. return ioctl(sock_ioctl, SIOCSIFVLAN, &ifr);
  1104. }
  1105. int system_vlan_add(struct device *dev, int id)
  1106. {
  1107. return system_vlan(dev, id);
  1108. }
  1109. int system_vlan_del(struct device *dev)
  1110. {
  1111. return system_vlan(dev, -1);
  1112. }
  1113. int system_vlandev_add(struct device *vlandev, struct device *dev, struct vlandev_config *cfg)
  1114. {
  1115. struct nl_msg *msg;
  1116. struct nlattr *linkinfo, *data;
  1117. struct ifinfomsg iim = { .ifi_family = AF_UNSPEC };
  1118. int rv;
  1119. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  1120. if (!msg)
  1121. return -1;
  1122. nlmsg_append(msg, &iim, sizeof(iim), 0);
  1123. nla_put_string(msg, IFLA_IFNAME, vlandev->ifname);
  1124. nla_put_u32(msg, IFLA_LINK, dev->ifindex);
  1125. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO)))
  1126. goto nla_put_failure;
  1127. nla_put_string(msg, IFLA_INFO_KIND, "vlan");
  1128. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA)))
  1129. goto nla_put_failure;
  1130. nla_put_u16(msg, IFLA_VLAN_ID, cfg->vid);
  1131. #if LINUX_VERSION_CODE >= KERNEL_VERSION(3,10,0)
  1132. nla_put_u16(msg, IFLA_VLAN_PROTOCOL, htons(cfg->proto));
  1133. #else
  1134. if(cfg->proto == VLAN_PROTO_8021AD)
  1135. netifd_log_message(L_WARNING, "%s Your kernel is older than linux 3.10.0, 802.1ad is not supported defaulting to 802.1q", vlandev->type->name);
  1136. #endif
  1137. nla_nest_end(msg, data);
  1138. nla_nest_end(msg, linkinfo);
  1139. rv = system_rtnl_call(msg);
  1140. if (rv)
  1141. D(SYSTEM, "Error adding vlandev '%s' over '%s': %d\n", vlandev->ifname, dev->ifname, rv);
  1142. return rv;
  1143. nla_put_failure:
  1144. nlmsg_free(msg);
  1145. return -ENOMEM;
  1146. }
  1147. int system_vlandev_del(struct device *vlandev)
  1148. {
  1149. return system_link_del(vlandev->ifname);
  1150. }
  1151. void
  1152. system_if_get_settings(struct device *dev, struct device_settings *s)
  1153. {
  1154. struct ifreq ifr;
  1155. char buf[10];
  1156. memset(&ifr, 0, sizeof(ifr));
  1157. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  1158. if (ioctl(sock_ioctl, SIOCGIFMTU, &ifr) == 0) {
  1159. s->mtu = ifr.ifr_mtu;
  1160. s->flags |= DEV_OPT_MTU;
  1161. }
  1162. s->mtu6 = system_update_ipv6_mtu(dev, 0);
  1163. if (s->mtu6 > 0)
  1164. s->flags |= DEV_OPT_MTU6;
  1165. if (ioctl(sock_ioctl, SIOCGIFTXQLEN, &ifr) == 0) {
  1166. s->txqueuelen = ifr.ifr_qlen;
  1167. s->flags |= DEV_OPT_TXQUEUELEN;
  1168. }
  1169. if (ioctl(sock_ioctl, SIOCGIFHWADDR, &ifr) == 0) {
  1170. memcpy(s->macaddr, &ifr.ifr_hwaddr.sa_data, sizeof(s->macaddr));
  1171. s->flags |= DEV_OPT_MACADDR;
  1172. }
  1173. if (!system_get_disable_ipv6(dev, buf, sizeof(buf))) {
  1174. s->ipv6 = !strtoul(buf, NULL, 0);
  1175. s->flags |= DEV_OPT_IPV6;
  1176. }
  1177. if (ioctl(sock_ioctl, SIOCGIFFLAGS, &ifr) == 0) {
  1178. s->promisc = ifr.ifr_flags & IFF_PROMISC;
  1179. s->flags |= DEV_OPT_PROMISC;
  1180. s->multicast = ifr.ifr_flags & IFF_MULTICAST;
  1181. s->flags |= DEV_OPT_MULTICAST;
  1182. }
  1183. if (!system_get_rpfilter(dev, buf, sizeof(buf))) {
  1184. s->rpfilter = strtoul(buf, NULL, 0);
  1185. s->flags |= DEV_OPT_RPFILTER;
  1186. }
  1187. if (!system_get_acceptlocal(dev, buf, sizeof(buf))) {
  1188. s->acceptlocal = strtoul(buf, NULL, 0);
  1189. s->flags |= DEV_OPT_ACCEPTLOCAL;
  1190. }
  1191. if (!system_get_igmpversion(dev, buf, sizeof(buf))) {
  1192. s->igmpversion = strtoul(buf, NULL, 0);
  1193. s->flags |= DEV_OPT_IGMPVERSION;
  1194. }
  1195. if (!system_get_mldversion(dev, buf, sizeof(buf))) {
  1196. s->mldversion = strtoul(buf, NULL, 0);
  1197. s->flags |= DEV_OPT_MLDVERSION;
  1198. }
  1199. if (!system_get_neigh4reachabletime(dev, buf, sizeof(buf))) {
  1200. s->neigh4reachabletime = strtoul(buf, NULL, 0);
  1201. s->flags |= DEV_OPT_NEIGHREACHABLETIME;
  1202. }
  1203. if (!system_get_neigh6reachabletime(dev, buf, sizeof(buf))) {
  1204. s->neigh6reachabletime = strtoul(buf, NULL, 0);
  1205. s->flags |= DEV_OPT_NEIGHREACHABLETIME;
  1206. }
  1207. if (!system_get_neigh4locktime(dev, buf, sizeof(buf))) {
  1208. s->neigh4locktime = strtol(buf, NULL, 0);
  1209. s->flags |= DEV_OPT_NEIGHLOCKTIME;
  1210. }
  1211. if (!system_get_neigh4gcstaletime(dev, buf, sizeof(buf))) {
  1212. s->neigh4gcstaletime = strtoul(buf, NULL, 0);
  1213. s->flags |= DEV_OPT_NEIGHGCSTALETIME;
  1214. }
  1215. if (!system_get_neigh6gcstaletime(dev, buf, sizeof(buf))) {
  1216. s->neigh6gcstaletime = strtoul(buf, NULL, 0);
  1217. s->flags |= DEV_OPT_NEIGHGCSTALETIME;
  1218. }
  1219. if (!system_get_dadtransmits(dev, buf, sizeof(buf))) {
  1220. s->dadtransmits = strtoul(buf, NULL, 0);
  1221. s->flags |= DEV_OPT_DADTRANSMITS;
  1222. }
  1223. if (!system_get_sendredirects(dev, buf, sizeof(buf))) {
  1224. s->sendredirects = strtoul(buf, NULL, 0);
  1225. s->flags |= DEV_OPT_SENDREDIRECTS;
  1226. }
  1227. }
  1228. void
  1229. system_if_apply_settings(struct device *dev, struct device_settings *s, unsigned int apply_mask)
  1230. {
  1231. struct ifreq ifr;
  1232. char buf[12];
  1233. memset(&ifr, 0, sizeof(ifr));
  1234. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  1235. if (s->flags & DEV_OPT_MTU & apply_mask) {
  1236. ifr.ifr_mtu = s->mtu;
  1237. if (ioctl(sock_ioctl, SIOCSIFMTU, &ifr) < 0)
  1238. s->flags &= ~DEV_OPT_MTU;
  1239. }
  1240. if (s->flags & DEV_OPT_MTU6 & apply_mask) {
  1241. system_update_ipv6_mtu(dev, s->mtu6);
  1242. }
  1243. if (s->flags & DEV_OPT_TXQUEUELEN & apply_mask) {
  1244. ifr.ifr_qlen = s->txqueuelen;
  1245. if (ioctl(sock_ioctl, SIOCSIFTXQLEN, &ifr) < 0)
  1246. s->flags &= ~DEV_OPT_TXQUEUELEN;
  1247. }
  1248. if ((s->flags & DEV_OPT_MACADDR & apply_mask) && !dev->external) {
  1249. ifr.ifr_hwaddr.sa_family = ARPHRD_ETHER;
  1250. memcpy(&ifr.ifr_hwaddr.sa_data, s->macaddr, sizeof(s->macaddr));
  1251. if (ioctl(sock_ioctl, SIOCSIFHWADDR, &ifr) < 0)
  1252. s->flags &= ~DEV_OPT_MACADDR;
  1253. }
  1254. if (s->flags & DEV_OPT_IPV6 & apply_mask)
  1255. system_set_disable_ipv6(dev, s->ipv6 ? "0" : "1");
  1256. if (s->flags & DEV_OPT_PROMISC & apply_mask) {
  1257. if (system_if_flags(dev->ifname, s->promisc ? IFF_PROMISC : 0,
  1258. !s->promisc ? IFF_PROMISC : 0) < 0)
  1259. s->flags &= ~DEV_OPT_PROMISC;
  1260. }
  1261. if (s->flags & DEV_OPT_RPFILTER & apply_mask) {
  1262. snprintf(buf, sizeof(buf), "%u", s->rpfilter);
  1263. system_set_rpfilter(dev, buf);
  1264. }
  1265. if (s->flags & DEV_OPT_ACCEPTLOCAL & apply_mask)
  1266. system_set_acceptlocal(dev, s->acceptlocal ? "1" : "0");
  1267. if (s->flags & DEV_OPT_IGMPVERSION & apply_mask) {
  1268. snprintf(buf, sizeof(buf), "%u", s->igmpversion);
  1269. system_set_igmpversion(dev, buf);
  1270. }
  1271. if (s->flags & DEV_OPT_MLDVERSION & apply_mask) {
  1272. snprintf(buf, sizeof(buf), "%u", s->mldversion);
  1273. system_set_mldversion(dev, buf);
  1274. }
  1275. if (s->flags & DEV_OPT_NEIGHREACHABLETIME & apply_mask) {
  1276. snprintf(buf, sizeof(buf), "%u", s->neigh4reachabletime);
  1277. system_set_neigh4reachabletime(dev, buf);
  1278. snprintf(buf, sizeof(buf), "%u", s->neigh6reachabletime);
  1279. system_set_neigh6reachabletime(dev, buf);
  1280. }
  1281. if (s->flags & DEV_OPT_NEIGHLOCKTIME & apply_mask) {
  1282. snprintf(buf, sizeof(buf), "%d", s->neigh4locktime);
  1283. system_set_neigh4locktime(dev, buf);
  1284. }
  1285. if (s->flags & DEV_OPT_NEIGHGCSTALETIME & apply_mask) {
  1286. snprintf(buf, sizeof(buf), "%u", s->neigh4gcstaletime);
  1287. system_set_neigh4gcstaletime(dev, buf);
  1288. snprintf(buf, sizeof(buf), "%u", s->neigh6gcstaletime);
  1289. system_set_neigh6gcstaletime(dev, buf);
  1290. }
  1291. if (s->flags & DEV_OPT_DADTRANSMITS & apply_mask) {
  1292. snprintf(buf, sizeof(buf), "%u", s->dadtransmits);
  1293. system_set_dadtransmits(dev, buf);
  1294. }
  1295. if (s->flags & DEV_OPT_MULTICAST & apply_mask) {
  1296. if (system_if_flags(dev->ifname, s->multicast ? IFF_MULTICAST : 0,
  1297. !s->multicast ? IFF_MULTICAST : 0) < 0)
  1298. s->flags &= ~DEV_OPT_MULTICAST;
  1299. }
  1300. if (s->flags & DEV_OPT_SENDREDIRECTS & apply_mask)
  1301. system_set_sendredirects(dev, s->sendredirects ? "1" : "0");
  1302. }
  1303. int system_if_up(struct device *dev)
  1304. {
  1305. system_if_get_settings(dev, &dev->orig_settings);
  1306. /* Only keep orig settings based on what needs to be set */
  1307. dev->orig_settings.valid_flags = dev->orig_settings.flags;
  1308. dev->orig_settings.flags &= dev->settings.flags;
  1309. system_if_apply_settings(dev, &dev->settings, dev->settings.flags);
  1310. return system_if_flags(dev->ifname, IFF_UP, 0);
  1311. }
  1312. int system_if_down(struct device *dev)
  1313. {
  1314. int ret = system_if_flags(dev->ifname, 0, IFF_UP);
  1315. system_if_apply_settings(dev, &dev->orig_settings, dev->orig_settings.flags);
  1316. return ret;
  1317. }
  1318. struct if_check_data {
  1319. struct device *dev;
  1320. int pending;
  1321. int ret;
  1322. };
  1323. #ifndef IFF_LOWER_UP
  1324. #define IFF_LOWER_UP 0x10000
  1325. #endif
  1326. static int cb_if_check_valid(struct nl_msg *msg, void *arg)
  1327. {
  1328. struct nlmsghdr *nh = nlmsg_hdr(msg);
  1329. struct ifinfomsg *ifi = NLMSG_DATA(nh);
  1330. struct if_check_data *chk = (struct if_check_data *)arg;
  1331. if (nh->nlmsg_type != RTM_NEWLINK)
  1332. return NL_SKIP;
  1333. device_set_present(chk->dev, ifi->ifi_index > 0 ? true : false);
  1334. device_set_link(chk->dev, ifi->ifi_flags & IFF_LOWER_UP ? true : false);
  1335. return NL_OK;
  1336. }
  1337. static int cb_if_check_ack(struct nl_msg *msg, void *arg)
  1338. {
  1339. struct if_check_data *chk = (struct if_check_data *)arg;
  1340. chk->pending = 0;
  1341. return NL_STOP;
  1342. }
  1343. static int cb_if_check_error(struct sockaddr_nl *nla, struct nlmsgerr *err, void *arg)
  1344. {
  1345. struct if_check_data *chk = (struct if_check_data *)arg;
  1346. device_set_present(chk->dev, false);
  1347. device_set_link(chk->dev, false);
  1348. chk->pending = err->error;
  1349. return NL_STOP;
  1350. }
  1351. int system_if_check(struct device *dev)
  1352. {
  1353. struct nl_cb *cb = nl_cb_alloc(NL_CB_DEFAULT);
  1354. struct nl_msg *msg;
  1355. struct ifinfomsg ifi = {
  1356. .ifi_family = AF_UNSPEC,
  1357. .ifi_index = 0,
  1358. };
  1359. struct if_check_data chk = {
  1360. .dev = dev,
  1361. .pending = 1,
  1362. };
  1363. int ret = 1;
  1364. if (!cb)
  1365. return ret;
  1366. msg = nlmsg_alloc_simple(RTM_GETLINK, 0);
  1367. if (!msg)
  1368. goto out;
  1369. if (nlmsg_append(msg, &ifi, sizeof(ifi), 0) ||
  1370. nla_put_string(msg, IFLA_IFNAME, dev->ifname))
  1371. goto free;
  1372. nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, cb_if_check_valid, &chk);
  1373. nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, cb_if_check_ack, &chk);
  1374. nl_cb_err(cb, NL_CB_CUSTOM, cb_if_check_error, &chk);
  1375. ret = nl_send_auto_complete(sock_rtnl, msg);
  1376. if (ret < 0)
  1377. goto free;
  1378. while (chk.pending > 0)
  1379. nl_recvmsgs(sock_rtnl, cb);
  1380. ret = chk.pending;
  1381. free:
  1382. nlmsg_free(msg);
  1383. out:
  1384. nl_cb_put(cb);
  1385. return ret;
  1386. }
  1387. struct device *
  1388. system_if_get_parent(struct device *dev)
  1389. {
  1390. char buf[64], *devname;
  1391. int ifindex, iflink, len;
  1392. FILE *f;
  1393. snprintf(buf, sizeof(buf), "/sys/class/net/%s/iflink", dev->ifname);
  1394. f = fopen(buf, "r");
  1395. if (!f)
  1396. return NULL;
  1397. len = fread(buf, 1, sizeof(buf) - 1, f);
  1398. fclose(f);
  1399. if (len <= 0)
  1400. return NULL;
  1401. buf[len] = 0;
  1402. iflink = strtoul(buf, NULL, 0);
  1403. ifindex = system_if_resolve(dev);
  1404. if (!iflink || iflink == ifindex)
  1405. return NULL;
  1406. devname = if_indextoname(iflink, buf);
  1407. if (!devname)
  1408. return NULL;
  1409. return device_get(devname, true);
  1410. }
  1411. static bool
  1412. read_string_file(int dir_fd, const char *file, char *buf, int len)
  1413. {
  1414. bool ret = false;
  1415. char *c;
  1416. int fd;
  1417. fd = openat(dir_fd, file, O_RDONLY);
  1418. if (fd < 0)
  1419. return false;
  1420. retry:
  1421. len = read(fd, buf, len - 1);
  1422. if (len < 0) {
  1423. if (errno == EINTR)
  1424. goto retry;
  1425. } else if (len > 0) {
  1426. buf[len] = 0;
  1427. c = strchr(buf, '\n');
  1428. if (c)
  1429. *c = 0;
  1430. ret = true;
  1431. }
  1432. close(fd);
  1433. return ret;
  1434. }
  1435. static bool
  1436. read_uint64_file(int dir_fd, const char *file, uint64_t *val)
  1437. {
  1438. char buf[64];
  1439. bool ret = false;
  1440. ret = read_string_file(dir_fd, file, buf, sizeof(buf));
  1441. if (ret)
  1442. *val = strtoull(buf, NULL, 0);
  1443. return ret;
  1444. }
  1445. /* Assume advertised flags == supported flags */
  1446. static const struct {
  1447. uint32_t mask;
  1448. const char *name;
  1449. } ethtool_link_modes[] = {
  1450. { ADVERTISED_10baseT_Half, "10baseT-H" },
  1451. { ADVERTISED_10baseT_Full, "10baseT-F" },
  1452. { ADVERTISED_100baseT_Half, "100baseT-H" },
  1453. { ADVERTISED_100baseT_Full, "100baseT-F" },
  1454. { ADVERTISED_1000baseT_Half, "1000baseT-H" },
  1455. { ADVERTISED_1000baseT_Full, "1000baseT-F" },
  1456. { ADVERTISED_1000baseKX_Full, "1000baseKX-F" },
  1457. { ADVERTISED_2500baseX_Full, "2500baseX-F" },
  1458. { ADVERTISED_10000baseT_Full, "10000baseT-F" },
  1459. { ADVERTISED_10000baseKX4_Full, "10000baseKX4-F" },
  1460. { ADVERTISED_10000baseKR_Full, "10000baseKR-F" },
  1461. { ADVERTISED_20000baseMLD2_Full, "20000baseMLD2-F" },
  1462. { ADVERTISED_20000baseKR2_Full, "20000baseKR2-F" },
  1463. { ADVERTISED_40000baseKR4_Full, "40000baseKR4-F" },
  1464. { ADVERTISED_40000baseCR4_Full, "40000baseCR4-F" },
  1465. { ADVERTISED_40000baseSR4_Full, "40000baseSR4-F" },
  1466. { ADVERTISED_40000baseLR4_Full, "40000baseLR4-F" },
  1467. #ifdef ADVERTISED_56000baseKR4_Full
  1468. { ADVERTISED_56000baseKR4_Full, "56000baseKR4-F" },
  1469. { ADVERTISED_56000baseCR4_Full, "56000baseCR4-F" },
  1470. { ADVERTISED_56000baseSR4_Full, "56000baseSR4-F" },
  1471. { ADVERTISED_56000baseLR4_Full, "56000baseLR4-F" },
  1472. #endif
  1473. };
  1474. static void system_add_link_modes(struct blob_buf *b, __u32 mask)
  1475. {
  1476. int i;
  1477. for (i = 0; i < ARRAY_SIZE(ethtool_link_modes); i++) {
  1478. if (mask & ethtool_link_modes[i].mask)
  1479. blobmsg_add_string(b, NULL, ethtool_link_modes[i].name);
  1480. }
  1481. }
  1482. bool
  1483. system_if_force_external(const char *ifname)
  1484. {
  1485. char buf[64];
  1486. struct stat s;
  1487. snprintf(buf, sizeof(buf), "/sys/class/net/%s/phy80211", ifname);
  1488. return stat(buf, &s) == 0;
  1489. }
  1490. int
  1491. system_if_dump_info(struct device *dev, struct blob_buf *b)
  1492. {
  1493. struct ethtool_cmd ecmd;
  1494. struct ifreq ifr;
  1495. char *s;
  1496. void *c;
  1497. memset(&ecmd, 0, sizeof(ecmd));
  1498. memset(&ifr, 0, sizeof(ifr));
  1499. strncpy(ifr.ifr_name, dev->ifname, sizeof(ifr.ifr_name) - 1);
  1500. ifr.ifr_data = (caddr_t) &ecmd;
  1501. ecmd.cmd = ETHTOOL_GSET;
  1502. if (ioctl(sock_ioctl, SIOCETHTOOL, &ifr) == 0) {
  1503. c = blobmsg_open_array(b, "link-advertising");
  1504. system_add_link_modes(b, ecmd.advertising);
  1505. blobmsg_close_array(b, c);
  1506. c = blobmsg_open_array(b, "link-partner-advertising");
  1507. system_add_link_modes(b, ecmd.lp_advertising);
  1508. blobmsg_close_array(b, c);
  1509. c = blobmsg_open_array(b, "link-supported");
  1510. system_add_link_modes(b, ecmd.supported);
  1511. blobmsg_close_array(b, c);
  1512. s = blobmsg_alloc_string_buffer(b, "speed", 8);
  1513. snprintf(s, 8, "%d%c", ethtool_cmd_speed(&ecmd),
  1514. ecmd.duplex == DUPLEX_HALF ? 'H' : 'F');
  1515. blobmsg_add_string_buffer(b);
  1516. blobmsg_add_u8(b, "autoneg", !!ecmd.autoneg);
  1517. }
  1518. return 0;
  1519. }
  1520. int
  1521. system_if_dump_stats(struct device *dev, struct blob_buf *b)
  1522. {
  1523. const char *const counters[] = {
  1524. "collisions", "rx_frame_errors", "tx_compressed",
  1525. "multicast", "rx_length_errors", "tx_dropped",
  1526. "rx_bytes", "rx_missed_errors", "tx_errors",
  1527. "rx_compressed", "rx_over_errors", "tx_fifo_errors",
  1528. "rx_crc_errors", "rx_packets", "tx_heartbeat_errors",
  1529. "rx_dropped", "tx_aborted_errors", "tx_packets",
  1530. "rx_errors", "tx_bytes", "tx_window_errors",
  1531. "rx_fifo_errors", "tx_carrier_errors",
  1532. };
  1533. char buf[64];
  1534. int stats_dir;
  1535. int i;
  1536. uint64_t val = 0;
  1537. snprintf(buf, sizeof(buf), "/sys/class/net/%s/statistics", dev->ifname);
  1538. stats_dir = open(buf, O_DIRECTORY);
  1539. if (stats_dir < 0)
  1540. return -1;
  1541. for (i = 0; i < ARRAY_SIZE(counters); i++)
  1542. if (read_uint64_file(stats_dir, counters[i], &val))
  1543. blobmsg_add_u64(b, counters[i], val);
  1544. close(stats_dir);
  1545. return 0;
  1546. }
  1547. static int system_addr(struct device *dev, struct device_addr *addr, int cmd)
  1548. {
  1549. bool v4 = ((addr->flags & DEVADDR_FAMILY) == DEVADDR_INET4);
  1550. int alen = v4 ? 4 : 16;
  1551. unsigned int flags = 0;
  1552. struct ifaddrmsg ifa = {
  1553. .ifa_family = (alen == 4) ? AF_INET : AF_INET6,
  1554. .ifa_prefixlen = addr->mask,
  1555. .ifa_index = dev->ifindex,
  1556. };
  1557. struct nl_msg *msg;
  1558. if (cmd == RTM_NEWADDR)
  1559. flags |= NLM_F_CREATE | NLM_F_REPLACE;
  1560. msg = nlmsg_alloc_simple(cmd, flags);
  1561. if (!msg)
  1562. return -1;
  1563. nlmsg_append(msg, &ifa, sizeof(ifa), 0);
  1564. nla_put(msg, IFA_LOCAL, alen, &addr->addr);
  1565. if (v4) {
  1566. if (addr->broadcast)
  1567. nla_put_u32(msg, IFA_BROADCAST, addr->broadcast);
  1568. if (addr->point_to_point)
  1569. nla_put_u32(msg, IFA_ADDRESS, addr->point_to_point);
  1570. } else {
  1571. time_t now = system_get_rtime();
  1572. struct ifa_cacheinfo cinfo = {0xffffffffU, 0xffffffffU, 0, 0};
  1573. if (addr->preferred_until) {
  1574. int64_t preferred = addr->preferred_until - now;
  1575. if (preferred < 0)
  1576. preferred = 0;
  1577. else if (preferred > UINT32_MAX)
  1578. preferred = UINT32_MAX;
  1579. cinfo.ifa_prefered = preferred;
  1580. }
  1581. if (addr->valid_until) {
  1582. int64_t valid = addr->valid_until - now;
  1583. if (valid <= 0) {
  1584. nlmsg_free(msg);
  1585. return -1;
  1586. }
  1587. else if (valid > UINT32_MAX)
  1588. valid = UINT32_MAX;
  1589. cinfo.ifa_valid = valid;
  1590. }
  1591. nla_put(msg, IFA_CACHEINFO, sizeof(cinfo), &cinfo);
  1592. if (cmd == RTM_NEWADDR && (addr->flags & DEVADDR_OFFLINK))
  1593. nla_put_u32(msg, IFA_FLAGS, IFA_F_NOPREFIXROUTE);
  1594. }
  1595. return system_rtnl_call(msg);
  1596. }
  1597. int system_add_address(struct device *dev, struct device_addr *addr)
  1598. {
  1599. return system_addr(dev, addr, RTM_NEWADDR);
  1600. }
  1601. int system_del_address(struct device *dev, struct device_addr *addr)
  1602. {
  1603. return system_addr(dev, addr, RTM_DELADDR);
  1604. }
  1605. static int system_neigh(struct device *dev, struct device_neighbor *neighbor, int cmd)
  1606. {
  1607. int alen = ((neighbor->flags & DEVADDR_FAMILY) == DEVADDR_INET4) ? 4 : 16;
  1608. unsigned int flags = 0;
  1609. struct ndmsg ndm = {
  1610. .ndm_family = (alen == 4) ? AF_INET : AF_INET6,
  1611. .ndm_ifindex = dev->ifindex,
  1612. .ndm_state = NUD_PERMANENT,
  1613. .ndm_flags = (neighbor->proxy ? NTF_PROXY : 0) | (neighbor->router ? NTF_ROUTER : 0),
  1614. };
  1615. struct nl_msg *msg;
  1616. if (cmd == RTM_NEWNEIGH)
  1617. flags |= NLM_F_CREATE | NLM_F_REPLACE;
  1618. msg = nlmsg_alloc_simple(cmd, flags);
  1619. if (!msg)
  1620. return -1;
  1621. nlmsg_append(msg, &ndm, sizeof(ndm), 0);
  1622. nla_put(msg, NDA_DST, alen, &neighbor->addr);
  1623. if (neighbor->flags & DEVNEIGH_MAC)
  1624. nla_put(msg, NDA_LLADDR, sizeof(neighbor->macaddr), &neighbor->macaddr);
  1625. return system_rtnl_call(msg);
  1626. }
  1627. int system_add_neighbor(struct device *dev, struct device_neighbor *neighbor)
  1628. {
  1629. return system_neigh(dev, neighbor, RTM_NEWNEIGH);
  1630. }
  1631. int system_del_neighbor(struct device *dev, struct device_neighbor *neighbor)
  1632. {
  1633. return system_neigh(dev, neighbor, RTM_DELNEIGH);
  1634. }
  1635. static int system_rt(struct device *dev, struct device_route *route, int cmd)
  1636. {
  1637. int alen = ((route->flags & DEVADDR_FAMILY) == DEVADDR_INET4) ? 4 : 16;
  1638. bool have_gw;
  1639. unsigned int flags = 0;
  1640. if (alen == 4)
  1641. have_gw = !!route->nexthop.in.s_addr;
  1642. else
  1643. have_gw = route->nexthop.in6.s6_addr32[0] ||
  1644. route->nexthop.in6.s6_addr32[1] ||
  1645. route->nexthop.in6.s6_addr32[2] ||
  1646. route->nexthop.in6.s6_addr32[3];
  1647. unsigned int table = (route->flags & (DEVROUTE_TABLE | DEVROUTE_SRCTABLE))
  1648. ? route->table : RT_TABLE_MAIN;
  1649. struct rtmsg rtm = {
  1650. .rtm_family = (alen == 4) ? AF_INET : AF_INET6,
  1651. .rtm_dst_len = route->mask,
  1652. .rtm_src_len = route->sourcemask,
  1653. .rtm_table = (table < 256) ? table : RT_TABLE_UNSPEC,
  1654. .rtm_protocol = (route->flags & DEVROUTE_PROTO) ? route->proto : RTPROT_STATIC,
  1655. .rtm_scope = RT_SCOPE_NOWHERE,
  1656. .rtm_type = (cmd == RTM_DELROUTE) ? 0: RTN_UNICAST,
  1657. .rtm_flags = (route->flags & DEVROUTE_ONLINK) ? RTNH_F_ONLINK : 0,
  1658. };
  1659. struct nl_msg *msg;
  1660. if (cmd == RTM_NEWROUTE) {
  1661. flags |= NLM_F_CREATE | NLM_F_REPLACE;
  1662. if (!dev) { /* Add null-route */
  1663. rtm.rtm_scope = RT_SCOPE_UNIVERSE;
  1664. rtm.rtm_type = RTN_UNREACHABLE;
  1665. }
  1666. else
  1667. rtm.rtm_scope = (have_gw) ? RT_SCOPE_UNIVERSE : RT_SCOPE_LINK;
  1668. }
  1669. if (route->flags & DEVROUTE_TYPE) {
  1670. rtm.rtm_type = route->type;
  1671. if (!(route->flags & (DEVROUTE_TABLE | DEVROUTE_SRCTABLE))) {
  1672. if (rtm.rtm_type == RTN_LOCAL || rtm.rtm_type == RTN_BROADCAST ||
  1673. rtm.rtm_type == RTN_NAT || rtm.rtm_type == RTN_ANYCAST)
  1674. rtm.rtm_table = RT_TABLE_LOCAL;
  1675. }
  1676. if (rtm.rtm_type == RTN_LOCAL || rtm.rtm_type == RTN_NAT) {
  1677. rtm.rtm_scope = RT_SCOPE_HOST;
  1678. } else if (rtm.rtm_type == RTN_BROADCAST || rtm.rtm_type == RTN_MULTICAST ||
  1679. rtm.rtm_type == RTN_ANYCAST) {
  1680. rtm.rtm_scope = RT_SCOPE_LINK;
  1681. } else if (rtm.rtm_type == RTN_BLACKHOLE || rtm.rtm_type == RTN_UNREACHABLE ||
  1682. rtm.rtm_type == RTN_PROHIBIT || rtm.rtm_type == RTN_FAILED_POLICY ||
  1683. rtm.rtm_type == RTN_THROW) {
  1684. rtm.rtm_scope = RT_SCOPE_UNIVERSE;
  1685. dev = NULL;
  1686. }
  1687. }
  1688. msg = nlmsg_alloc_simple(cmd, flags);
  1689. if (!msg)
  1690. return -1;
  1691. nlmsg_append(msg, &rtm, sizeof(rtm), 0);
  1692. if (route->mask)
  1693. nla_put(msg, RTA_DST, alen, &route->addr);
  1694. if (route->sourcemask) {
  1695. if (rtm.rtm_family == AF_INET)
  1696. nla_put(msg, RTA_PREFSRC, alen, &route->source);
  1697. else
  1698. nla_put(msg, RTA_SRC, alen, &route->source);
  1699. }
  1700. if (route->metric > 0)
  1701. nla_put_u32(msg, RTA_PRIORITY, route->metric);
  1702. if (have_gw)
  1703. nla_put(msg, RTA_GATEWAY, alen, &route->nexthop);
  1704. if (dev)
  1705. nla_put_u32(msg, RTA_OIF, dev->ifindex);
  1706. if (table >= 256)
  1707. nla_put_u32(msg, RTA_TABLE, table);
  1708. if (route->flags & DEVROUTE_MTU) {
  1709. struct nlattr *metrics;
  1710. if (!(metrics = nla_nest_start(msg, RTA_METRICS)))
  1711. goto nla_put_failure;
  1712. nla_put_u32(msg, RTAX_MTU, route->mtu);
  1713. nla_nest_end(msg, metrics);
  1714. }
  1715. return system_rtnl_call(msg);
  1716. nla_put_failure:
  1717. nlmsg_free(msg);
  1718. return -ENOMEM;
  1719. }
  1720. int system_add_route(struct device *dev, struct device_route *route)
  1721. {
  1722. return system_rt(dev, route, RTM_NEWROUTE);
  1723. }
  1724. int system_del_route(struct device *dev, struct device_route *route)
  1725. {
  1726. return system_rt(dev, route, RTM_DELROUTE);
  1727. }
  1728. int system_flush_routes(void)
  1729. {
  1730. const char *names[] = {
  1731. "/proc/sys/net/ipv4/route/flush",
  1732. "/proc/sys/net/ipv6/route/flush"
  1733. };
  1734. int fd, i;
  1735. for (i = 0; i < ARRAY_SIZE(names); i++) {
  1736. fd = open(names[i], O_WRONLY);
  1737. if (fd < 0)
  1738. continue;
  1739. if (write(fd, "-1", 2)) {}
  1740. close(fd);
  1741. }
  1742. return 0;
  1743. }
  1744. bool system_resolve_rt_type(const char *type, unsigned int *id)
  1745. {
  1746. return system_rtn_aton(type, id);
  1747. }
  1748. bool system_resolve_rt_proto(const char *type, unsigned int *id)
  1749. {
  1750. FILE *f;
  1751. char *e, buf[128];
  1752. unsigned int n, proto = 256;
  1753. n = strtoul(type, &e, 0);
  1754. if (!*e && e != type)
  1755. proto = n;
  1756. else if (!strcmp(type, "unspec"))
  1757. proto = RTPROT_UNSPEC;
  1758. else if (!strcmp(type, "kernel"))
  1759. proto = RTPROT_KERNEL;
  1760. else if (!strcmp(type, "boot"))
  1761. proto = RTPROT_BOOT;
  1762. else if (!strcmp(type, "static"))
  1763. proto = RTPROT_STATIC;
  1764. else if ((f = fopen("/etc/iproute2/rt_protos", "r")) != NULL) {
  1765. while (fgets(buf, sizeof(buf) - 1, f) != NULL) {
  1766. if ((e = strtok(buf, " \t\n")) == NULL || *e == '#')
  1767. continue;
  1768. n = strtoul(e, NULL, 10);
  1769. e = strtok(NULL, " \t\n");
  1770. if (e && !strcmp(e, type)) {
  1771. proto = n;
  1772. break;
  1773. }
  1774. }
  1775. fclose(f);
  1776. }
  1777. if (proto > 255)
  1778. return false;
  1779. *id = proto;
  1780. return true;
  1781. }
  1782. bool system_resolve_rt_table(const char *name, unsigned int *id)
  1783. {
  1784. FILE *f;
  1785. char *e, buf[128];
  1786. unsigned int n, table = RT_TABLE_UNSPEC;
  1787. /* first try to parse table as number */
  1788. if ((n = strtoul(name, &e, 0)) > 0 && !*e)
  1789. table = n;
  1790. /* handle well known aliases */
  1791. else if (!strcmp(name, "default"))
  1792. table = RT_TABLE_DEFAULT;
  1793. else if (!strcmp(name, "main"))
  1794. table = RT_TABLE_MAIN;
  1795. else if (!strcmp(name, "local"))
  1796. table = RT_TABLE_LOCAL;
  1797. /* try to look up name in /etc/iproute2/rt_tables */
  1798. else if ((f = fopen("/etc/iproute2/rt_tables", "r")) != NULL)
  1799. {
  1800. while (fgets(buf, sizeof(buf) - 1, f) != NULL)
  1801. {
  1802. if ((e = strtok(buf, " \t\n")) == NULL || *e == '#')
  1803. continue;
  1804. n = strtoul(e, NULL, 10);
  1805. e = strtok(NULL, " \t\n");
  1806. if (e && !strcmp(e, name))
  1807. {
  1808. table = n;
  1809. break;
  1810. }
  1811. }
  1812. fclose(f);
  1813. }
  1814. if (table == RT_TABLE_UNSPEC)
  1815. return false;
  1816. *id = table;
  1817. return true;
  1818. }
  1819. bool system_is_default_rt_table(unsigned int id)
  1820. {
  1821. return (id == RT_TABLE_MAIN);
  1822. }
  1823. bool system_resolve_rpfilter(const char *filter, unsigned int *id)
  1824. {
  1825. char *e;
  1826. unsigned int n;
  1827. if (!strcmp(filter, "strict"))
  1828. n = 1;
  1829. else if (!strcmp(filter, "loose"))
  1830. n = 2;
  1831. else {
  1832. n = strtoul(filter, &e, 0);
  1833. if (*e || e == filter || n > 2)
  1834. return false;
  1835. }
  1836. *id = n;
  1837. return true;
  1838. }
  1839. static int system_iprule(struct iprule *rule, int cmd)
  1840. {
  1841. int alen = ((rule->flags & IPRULE_FAMILY) == IPRULE_INET4) ? 4 : 16;
  1842. struct nl_msg *msg;
  1843. struct rtmsg rtm = {
  1844. .rtm_family = (alen == 4) ? AF_INET : AF_INET6,
  1845. .rtm_protocol = RTPROT_STATIC,
  1846. .rtm_scope = RT_SCOPE_UNIVERSE,
  1847. .rtm_table = RT_TABLE_UNSPEC,
  1848. .rtm_type = RTN_UNSPEC,
  1849. .rtm_flags = 0,
  1850. };
  1851. if (cmd == RTM_NEWRULE)
  1852. rtm.rtm_type = RTN_UNICAST;
  1853. if (rule->invert)
  1854. rtm.rtm_flags |= FIB_RULE_INVERT;
  1855. if (rule->flags & IPRULE_SRC)
  1856. rtm.rtm_src_len = rule->src_mask;
  1857. if (rule->flags & IPRULE_DEST)
  1858. rtm.rtm_dst_len = rule->dest_mask;
  1859. if (rule->flags & IPRULE_TOS)
  1860. rtm.rtm_tos = rule->tos;
  1861. if (rule->flags & IPRULE_LOOKUP) {
  1862. if (rule->lookup < 256)
  1863. rtm.rtm_table = rule->lookup;
  1864. }
  1865. if (rule->flags & IPRULE_ACTION)
  1866. rtm.rtm_type = rule->action;
  1867. else if (rule->flags & IPRULE_GOTO)
  1868. rtm.rtm_type = FR_ACT_GOTO;
  1869. else if (!(rule->flags & (IPRULE_LOOKUP | IPRULE_ACTION | IPRULE_GOTO)))
  1870. rtm.rtm_type = FR_ACT_NOP;
  1871. msg = nlmsg_alloc_simple(cmd, NLM_F_REQUEST);
  1872. if (!msg)
  1873. return -1;
  1874. nlmsg_append(msg, &rtm, sizeof(rtm), 0);
  1875. if (rule->flags & IPRULE_IN)
  1876. nla_put(msg, FRA_IFNAME, strlen(rule->in_dev) + 1, rule->in_dev);
  1877. if (rule->flags & IPRULE_OUT)
  1878. nla_put(msg, FRA_OIFNAME, strlen(rule->out_dev) + 1, rule->out_dev);
  1879. if (rule->flags & IPRULE_SRC)
  1880. nla_put(msg, FRA_SRC, alen, &rule->src_addr);
  1881. if (rule->flags & IPRULE_DEST)
  1882. nla_put(msg, FRA_DST, alen, &rule->dest_addr);
  1883. if (rule->flags & IPRULE_PRIORITY)
  1884. nla_put_u32(msg, FRA_PRIORITY, rule->priority);
  1885. else if (cmd == RTM_NEWRULE)
  1886. nla_put_u32(msg, FRA_PRIORITY, rule->order);
  1887. if (rule->flags & IPRULE_FWMARK)
  1888. nla_put_u32(msg, FRA_FWMARK, rule->fwmark);
  1889. if (rule->flags & IPRULE_FWMASK)
  1890. nla_put_u32(msg, FRA_FWMASK, rule->fwmask);
  1891. if (rule->flags & IPRULE_LOOKUP) {
  1892. if (rule->lookup >= 256)
  1893. nla_put_u32(msg, FRA_TABLE, rule->lookup);
  1894. }
  1895. if (rule->flags & IPRULE_SUP_PREFIXLEN)
  1896. nla_put_u32(msg, FRA_SUPPRESS_PREFIXLEN, rule->sup_prefixlen);
  1897. if (rule->flags & IPRULE_GOTO)
  1898. nla_put_u32(msg, FRA_GOTO, rule->gotoid);
  1899. return system_rtnl_call(msg);
  1900. }
  1901. int system_add_iprule(struct iprule *rule)
  1902. {
  1903. return system_iprule(rule, RTM_NEWRULE);
  1904. }
  1905. int system_del_iprule(struct iprule *rule)
  1906. {
  1907. return system_iprule(rule, RTM_DELRULE);
  1908. }
  1909. int system_flush_iprules(void)
  1910. {
  1911. int rv = 0;
  1912. struct iprule rule;
  1913. system_if_clear_entries(NULL, RTM_GETRULE, AF_INET);
  1914. system_if_clear_entries(NULL, RTM_GETRULE, AF_INET6);
  1915. memset(&rule, 0, sizeof(rule));
  1916. rule.flags = IPRULE_INET4 | IPRULE_PRIORITY | IPRULE_LOOKUP;
  1917. rule.priority = 0;
  1918. rule.lookup = RT_TABLE_LOCAL;
  1919. rv |= system_iprule(&rule, RTM_NEWRULE);
  1920. rule.priority = 32766;
  1921. rule.lookup = RT_TABLE_MAIN;
  1922. rv |= system_iprule(&rule, RTM_NEWRULE);
  1923. rule.priority = 32767;
  1924. rule.lookup = RT_TABLE_DEFAULT;
  1925. rv |= system_iprule(&rule, RTM_NEWRULE);
  1926. rule.flags = IPRULE_INET6 | IPRULE_PRIORITY | IPRULE_LOOKUP;
  1927. rule.priority = 0;
  1928. rule.lookup = RT_TABLE_LOCAL;
  1929. rv |= system_iprule(&rule, RTM_NEWRULE);
  1930. rule.priority = 32766;
  1931. rule.lookup = RT_TABLE_MAIN;
  1932. rv |= system_iprule(&rule, RTM_NEWRULE);
  1933. return rv;
  1934. }
  1935. bool system_resolve_iprule_action(const char *action, unsigned int *id)
  1936. {
  1937. return system_rtn_aton(action, id);
  1938. }
  1939. time_t system_get_rtime(void)
  1940. {
  1941. struct timespec ts;
  1942. struct timeval tv;
  1943. if (syscall(__NR_clock_gettime, CLOCK_MONOTONIC, &ts) == 0)
  1944. return ts.tv_sec;
  1945. if (gettimeofday(&tv, NULL) == 0)
  1946. return tv.tv_sec;
  1947. return 0;
  1948. }
  1949. #ifndef IP_DF
  1950. #define IP_DF 0x4000
  1951. #endif
  1952. static int tunnel_ioctl(const char *name, int cmd, void *p)
  1953. {
  1954. struct ifreq ifr;
  1955. memset(&ifr, 0, sizeof(ifr));
  1956. strncpy(ifr.ifr_name, name, sizeof(ifr.ifr_name) - 1);
  1957. ifr.ifr_ifru.ifru_data = p;
  1958. return ioctl(sock_ioctl, cmd, &ifr);
  1959. }
  1960. #ifdef IFLA_IPTUN_MAX
  1961. static int system_add_ip6_tunnel(const char *name, const unsigned int link,
  1962. struct blob_attr **tb)
  1963. {
  1964. struct nl_msg *nlm = nlmsg_alloc_simple(RTM_NEWLINK,
  1965. NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  1966. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC };
  1967. struct blob_attr *cur;
  1968. int ret = 0, ttl = 0;
  1969. if (!nlm)
  1970. return -1;
  1971. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  1972. nla_put_string(nlm, IFLA_IFNAME, name);
  1973. if (link)
  1974. nla_put_u32(nlm, IFLA_LINK, link);
  1975. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  1976. if (!linkinfo) {
  1977. ret = -ENOMEM;
  1978. goto failure;
  1979. }
  1980. nla_put_string(nlm, IFLA_INFO_KIND, "ip6tnl");
  1981. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  1982. if (!infodata) {
  1983. ret = -ENOMEM;
  1984. goto failure;
  1985. }
  1986. if (link)
  1987. nla_put_u32(nlm, IFLA_IPTUN_LINK, link);
  1988. if ((cur = tb[TUNNEL_ATTR_TTL]))
  1989. ttl = blobmsg_get_u32(cur);
  1990. nla_put_u8(nlm, IFLA_IPTUN_PROTO, IPPROTO_IPIP);
  1991. nla_put_u8(nlm, IFLA_IPTUN_TTL, (ttl) ? ttl : 64);
  1992. struct in6_addr in6buf;
  1993. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  1994. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  1995. ret = -EINVAL;
  1996. goto failure;
  1997. }
  1998. nla_put(nlm, IFLA_IPTUN_LOCAL, sizeof(in6buf), &in6buf);
  1999. }
  2000. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2001. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2002. ret = -EINVAL;
  2003. goto failure;
  2004. }
  2005. nla_put(nlm, IFLA_IPTUN_REMOTE, sizeof(in6buf), &in6buf);
  2006. }
  2007. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2008. struct blob_attr *tb_data[__IPIP6_DATA_ATTR_MAX];
  2009. uint32_t tun_flags = IP6_TNL_F_IGN_ENCAP_LIMIT;
  2010. blobmsg_parse(ipip6_data_attr_list.params, __IPIP6_DATA_ATTR_MAX, tb_data,
  2011. blobmsg_data(cur), blobmsg_len(cur));
  2012. if ((cur = tb_data[IPIP6_DATA_ENCAPLIMIT])) {
  2013. char *str = blobmsg_get_string(cur);
  2014. if (strcmp(str, "ignore")) {
  2015. char *e;
  2016. unsigned encap_limit = strtoul(str, &e, 0);
  2017. if (e == str || *e || encap_limit > 255) {
  2018. ret = -EINVAL;
  2019. goto failure;
  2020. }
  2021. nla_put_u8(nlm, IFLA_IPTUN_ENCAP_LIMIT, encap_limit);
  2022. tun_flags &= ~IP6_TNL_F_IGN_ENCAP_LIMIT;
  2023. }
  2024. }
  2025. #ifdef IFLA_IPTUN_FMR_MAX
  2026. if ((cur = tb_data[IPIP6_DATA_FMRS])) {
  2027. struct blob_attr *rcur;
  2028. unsigned rrem, fmrcnt = 0;
  2029. struct nlattr *fmrs = nla_nest_start(nlm, IFLA_IPTUN_FMRS);
  2030. if (!fmrs) {
  2031. ret = -ENOMEM;
  2032. goto failure;
  2033. }
  2034. blobmsg_for_each_attr(rcur, cur, rrem) {
  2035. struct blob_attr *tb_fmr[__FMR_DATA_ATTR_MAX], *tb_cur;
  2036. struct in6_addr ip6prefix;
  2037. struct in_addr ip4prefix;
  2038. unsigned ip4len, ip6len, ealen, offset;
  2039. blobmsg_parse(fmr_data_attr_list.params, __FMR_DATA_ATTR_MAX, tb_fmr,
  2040. blobmsg_data(rcur), blobmsg_len(rcur));
  2041. if (!(tb_cur = tb_fmr[FMR_DATA_PREFIX6]) ||
  2042. !parse_ip_and_netmask(AF_INET6,
  2043. blobmsg_data(tb_cur), &ip6prefix,
  2044. &ip6len)) {
  2045. ret = -EINVAL;
  2046. goto failure;
  2047. }
  2048. if (!(tb_cur = tb_fmr[FMR_DATA_PREFIX4]) ||
  2049. !parse_ip_and_netmask(AF_INET,
  2050. blobmsg_data(tb_cur), &ip4prefix,
  2051. &ip4len)) {
  2052. ret = -EINVAL;
  2053. goto failure;
  2054. }
  2055. if (!(tb_cur = tb_fmr[FMR_DATA_EALEN])) {
  2056. ret = -EINVAL;
  2057. goto failure;
  2058. }
  2059. ealen = blobmsg_get_u32(tb_cur);
  2060. if (!(tb_cur = tb_fmr[FMR_DATA_OFFSET])) {
  2061. ret = -EINVAL;
  2062. goto failure;
  2063. }
  2064. offset = blobmsg_get_u32(tb_cur);
  2065. struct nlattr *rule = nla_nest_start(nlm, ++fmrcnt);
  2066. if (!rule) {
  2067. ret = -ENOMEM;
  2068. goto failure;
  2069. }
  2070. nla_put(nlm, IFLA_IPTUN_FMR_IP6_PREFIX, sizeof(ip6prefix), &ip6prefix);
  2071. nla_put(nlm, IFLA_IPTUN_FMR_IP4_PREFIX, sizeof(ip4prefix), &ip4prefix);
  2072. nla_put_u8(nlm, IFLA_IPTUN_FMR_IP6_PREFIX_LEN, ip6len);
  2073. nla_put_u8(nlm, IFLA_IPTUN_FMR_IP4_PREFIX_LEN, ip4len);
  2074. nla_put_u8(nlm, IFLA_IPTUN_FMR_EA_LEN, ealen);
  2075. nla_put_u8(nlm, IFLA_IPTUN_FMR_OFFSET, offset);
  2076. nla_nest_end(nlm, rule);
  2077. }
  2078. nla_nest_end(nlm, fmrs);
  2079. }
  2080. #endif
  2081. if (tun_flags)
  2082. nla_put_u32(nlm, IFLA_IPTUN_FLAGS, tun_flags);
  2083. }
  2084. nla_nest_end(nlm, infodata);
  2085. nla_nest_end(nlm, linkinfo);
  2086. return system_rtnl_call(nlm);
  2087. failure:
  2088. nlmsg_free(nlm);
  2089. return ret;
  2090. }
  2091. #endif
  2092. #ifdef IFLA_IPTUN_MAX
  2093. #define IP6_FLOWINFO_TCLASS htonl(0x0FF00000)
  2094. static int system_add_gre_tunnel(const char *name, const char *kind,
  2095. const unsigned int link, struct blob_attr **tb, bool v6)
  2096. {
  2097. struct nl_msg *nlm;
  2098. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC, };
  2099. struct blob_attr *cur;
  2100. uint32_t ikey = 0, okey = 0, flowinfo = 0, flags6 = IP6_TNL_F_IGN_ENCAP_LIMIT;
  2101. uint16_t iflags = 0, oflags = 0;
  2102. uint8_t tos = 0;
  2103. int ret = 0, ttl = 0;
  2104. unsigned encap_limit = 0;
  2105. nlm = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  2106. if (!nlm)
  2107. return -1;
  2108. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  2109. nla_put_string(nlm, IFLA_IFNAME, name);
  2110. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  2111. if (!linkinfo) {
  2112. ret = -ENOMEM;
  2113. goto failure;
  2114. }
  2115. nla_put_string(nlm, IFLA_INFO_KIND, kind);
  2116. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  2117. if (!infodata) {
  2118. ret = -ENOMEM;
  2119. goto failure;
  2120. }
  2121. if (link)
  2122. nla_put_u32(nlm, IFLA_GRE_LINK, link);
  2123. if ((cur = tb[TUNNEL_ATTR_TTL]))
  2124. ttl = blobmsg_get_u32(cur);
  2125. if ((cur = tb[TUNNEL_ATTR_TOS])) {
  2126. char *str = blobmsg_get_string(cur);
  2127. if (strcmp(str, "inherit")) {
  2128. unsigned uval;
  2129. if (!system_tos_aton(str, &uval)) {
  2130. ret = -EINVAL;
  2131. goto failure;
  2132. }
  2133. if (v6)
  2134. flowinfo |= htonl(uval << 20) & IP6_FLOWINFO_TCLASS;
  2135. else
  2136. tos = uval;
  2137. } else {
  2138. if (v6)
  2139. flags6 |= IP6_TNL_F_USE_ORIG_TCLASS;
  2140. else
  2141. tos = 1;
  2142. }
  2143. }
  2144. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2145. struct blob_attr *tb_data[__GRE_DATA_ATTR_MAX];
  2146. blobmsg_parse(gre_data_attr_list.params, __GRE_DATA_ATTR_MAX, tb_data,
  2147. blobmsg_data(cur), blobmsg_len(cur));
  2148. if ((cur = tb_data[GRE_DATA_IKEY])) {
  2149. if ((ikey = blobmsg_get_u32(cur)))
  2150. iflags |= GRE_KEY;
  2151. }
  2152. if ((cur = tb_data[GRE_DATA_OKEY])) {
  2153. if ((okey = blobmsg_get_u32(cur)))
  2154. oflags |= GRE_KEY;
  2155. }
  2156. if ((cur = tb_data[GRE_DATA_ICSUM])) {
  2157. if (blobmsg_get_bool(cur))
  2158. iflags |= GRE_CSUM;
  2159. }
  2160. if ((cur = tb_data[GRE_DATA_OCSUM])) {
  2161. if (blobmsg_get_bool(cur))
  2162. oflags |= GRE_CSUM;
  2163. }
  2164. if ((cur = tb_data[GRE_DATA_ISEQNO])) {
  2165. if (blobmsg_get_bool(cur))
  2166. iflags |= GRE_SEQ;
  2167. }
  2168. if ((cur = tb_data[GRE_DATA_OSEQNO])) {
  2169. if (blobmsg_get_bool(cur))
  2170. oflags |= GRE_SEQ;
  2171. }
  2172. if ((cur = tb_data[GRE_DATA_ENCAPLIMIT])) {
  2173. char *str = blobmsg_get_string(cur);
  2174. if (strcmp(str, "ignore")) {
  2175. char *e;
  2176. encap_limit = strtoul(str, &e, 0);
  2177. if (e == str || *e || encap_limit > 255) {
  2178. ret = -EINVAL;
  2179. goto failure;
  2180. }
  2181. flags6 &= ~IP6_TNL_F_IGN_ENCAP_LIMIT;
  2182. }
  2183. }
  2184. }
  2185. if (v6) {
  2186. struct in6_addr in6buf;
  2187. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2188. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2189. ret = -EINVAL;
  2190. goto failure;
  2191. }
  2192. nla_put(nlm, IFLA_GRE_LOCAL, sizeof(in6buf), &in6buf);
  2193. }
  2194. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2195. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2196. ret = -EINVAL;
  2197. goto failure;
  2198. }
  2199. nla_put(nlm, IFLA_GRE_REMOTE, sizeof(in6buf), &in6buf);
  2200. }
  2201. if (!(flags6 & IP6_TNL_F_IGN_ENCAP_LIMIT))
  2202. nla_put_u8(nlm, IFLA_GRE_ENCAP_LIMIT, encap_limit);
  2203. if (flowinfo)
  2204. nla_put_u32(nlm, IFLA_GRE_FLOWINFO, flowinfo);
  2205. if (flags6)
  2206. nla_put_u32(nlm, IFLA_GRE_FLAGS, flags6);
  2207. if (!ttl)
  2208. ttl = 64;
  2209. } else {
  2210. struct in_addr inbuf;
  2211. bool set_df = true;
  2212. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2213. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2214. ret = -EINVAL;
  2215. goto failure;
  2216. }
  2217. nla_put(nlm, IFLA_GRE_LOCAL, sizeof(inbuf), &inbuf);
  2218. }
  2219. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2220. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2221. ret = -EINVAL;
  2222. goto failure;
  2223. }
  2224. nla_put(nlm, IFLA_GRE_REMOTE, sizeof(inbuf), &inbuf);
  2225. if (IN_MULTICAST(ntohl(inbuf.s_addr))) {
  2226. if (!okey) {
  2227. okey = inbuf.s_addr;
  2228. oflags |= GRE_KEY;
  2229. }
  2230. if (!ikey) {
  2231. ikey = inbuf.s_addr;
  2232. iflags |= GRE_KEY;
  2233. }
  2234. }
  2235. }
  2236. if ((cur = tb[TUNNEL_ATTR_DF]))
  2237. set_df = blobmsg_get_bool(cur);
  2238. if (!set_df) {
  2239. /* ttl != 0 and nopmtudisc are incompatible */
  2240. if (ttl) {
  2241. ret = -EINVAL;
  2242. goto failure;
  2243. }
  2244. } else if (!ttl)
  2245. ttl = 64;
  2246. nla_put_u8(nlm, IFLA_GRE_PMTUDISC, set_df ? 1 : 0);
  2247. nla_put_u8(nlm, IFLA_GRE_TOS, tos);
  2248. }
  2249. if (ttl)
  2250. nla_put_u8(nlm, IFLA_GRE_TTL, ttl);
  2251. if (oflags)
  2252. nla_put_u16(nlm, IFLA_GRE_OFLAGS, oflags);
  2253. if (iflags)
  2254. nla_put_u16(nlm, IFLA_GRE_IFLAGS, iflags);
  2255. if (okey)
  2256. nla_put_u32(nlm, IFLA_GRE_OKEY, htonl(okey));
  2257. if (ikey)
  2258. nla_put_u32(nlm, IFLA_GRE_IKEY, htonl(ikey));
  2259. nla_nest_end(nlm, infodata);
  2260. nla_nest_end(nlm, linkinfo);
  2261. return system_rtnl_call(nlm);
  2262. failure:
  2263. nlmsg_free(nlm);
  2264. return ret;
  2265. }
  2266. #endif
  2267. #ifdef IFLA_VTI_MAX
  2268. static int system_add_vti_tunnel(const char *name, const char *kind,
  2269. const unsigned int link, struct blob_attr **tb, bool v6)
  2270. {
  2271. struct nl_msg *nlm;
  2272. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC, };
  2273. struct blob_attr *cur;
  2274. int ret = 0;
  2275. nlm = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  2276. if (!nlm)
  2277. return -1;
  2278. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  2279. nla_put_string(nlm, IFLA_IFNAME, name);
  2280. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  2281. if (!linkinfo) {
  2282. ret = -ENOMEM;
  2283. goto failure;
  2284. }
  2285. nla_put_string(nlm, IFLA_INFO_KIND, kind);
  2286. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  2287. if (!infodata) {
  2288. ret = -ENOMEM;
  2289. goto failure;
  2290. }
  2291. if (link)
  2292. nla_put_u32(nlm, IFLA_VTI_LINK, link);
  2293. if (v6) {
  2294. struct in6_addr in6buf;
  2295. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2296. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2297. ret = -EINVAL;
  2298. goto failure;
  2299. }
  2300. nla_put(nlm, IFLA_VTI_LOCAL, sizeof(in6buf), &in6buf);
  2301. }
  2302. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2303. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2304. ret = -EINVAL;
  2305. goto failure;
  2306. }
  2307. nla_put(nlm, IFLA_VTI_REMOTE, sizeof(in6buf), &in6buf);
  2308. }
  2309. } else {
  2310. struct in_addr inbuf;
  2311. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2312. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2313. ret = -EINVAL;
  2314. goto failure;
  2315. }
  2316. nla_put(nlm, IFLA_VTI_LOCAL, sizeof(inbuf), &inbuf);
  2317. }
  2318. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2319. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2320. ret = -EINVAL;
  2321. goto failure;
  2322. }
  2323. nla_put(nlm, IFLA_VTI_REMOTE, sizeof(inbuf), &inbuf);
  2324. }
  2325. }
  2326. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2327. struct blob_attr *tb_data[__VTI_DATA_ATTR_MAX];
  2328. uint32_t ikey = 0, okey = 0;
  2329. blobmsg_parse(vti_data_attr_list.params, __VTI_DATA_ATTR_MAX, tb_data,
  2330. blobmsg_data(cur), blobmsg_len(cur));
  2331. if ((cur = tb_data[VTI_DATA_IKEY])) {
  2332. if ((ikey = blobmsg_get_u32(cur)))
  2333. nla_put_u32(nlm, IFLA_VTI_IKEY, htonl(ikey));
  2334. }
  2335. if ((cur = tb_data[VTI_DATA_OKEY])) {
  2336. if ((okey = blobmsg_get_u32(cur)))
  2337. nla_put_u32(nlm, IFLA_VTI_OKEY, htonl(okey));
  2338. }
  2339. }
  2340. nla_nest_end(nlm, infodata);
  2341. nla_nest_end(nlm, linkinfo);
  2342. return system_rtnl_call(nlm);
  2343. failure:
  2344. nlmsg_free(nlm);
  2345. return ret;
  2346. }
  2347. #endif
  2348. #ifdef IFLA_XFRM_MAX
  2349. static int system_add_xfrm_tunnel(const char *name, const char *kind,
  2350. const unsigned int link, struct blob_attr **tb)
  2351. {
  2352. struct nl_msg *nlm;
  2353. struct ifinfomsg ifi = { .ifi_family = AF_UNSPEC, };
  2354. struct blob_attr *cur;
  2355. int ret = 0;
  2356. nlm = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_REPLACE | NLM_F_CREATE);
  2357. if (!nlm)
  2358. return -1;
  2359. nlmsg_append(nlm, &ifi, sizeof(ifi), 0);
  2360. nla_put_string(nlm, IFLA_IFNAME, name);
  2361. struct nlattr *linkinfo = nla_nest_start(nlm, IFLA_LINKINFO);
  2362. if (!linkinfo) {
  2363. ret = -ENOMEM;
  2364. goto failure;
  2365. }
  2366. nla_put_string(nlm, IFLA_INFO_KIND, kind);
  2367. struct nlattr *infodata = nla_nest_start(nlm, IFLA_INFO_DATA);
  2368. if (!infodata) {
  2369. ret = -ENOMEM;
  2370. goto failure;
  2371. }
  2372. if (link)
  2373. nla_put_u32(nlm, IFLA_XFRM_LINK, link);
  2374. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2375. struct blob_attr *tb_data[__XFRM_DATA_ATTR_MAX];
  2376. uint32_t if_id = 0;
  2377. blobmsg_parse(xfrm_data_attr_list.params, __XFRM_DATA_ATTR_MAX, tb_data,
  2378. blobmsg_data(cur), blobmsg_len(cur));
  2379. if ((cur = tb_data[XFRM_DATA_IF_ID])) {
  2380. if ((if_id = blobmsg_get_u32(cur)))
  2381. nla_put_u32(nlm, IFLA_XFRM_IF_ID, if_id);
  2382. }
  2383. }
  2384. nla_nest_end(nlm, infodata);
  2385. nla_nest_end(nlm, linkinfo);
  2386. return system_rtnl_call(nlm);
  2387. failure:
  2388. nlmsg_free(nlm);
  2389. return ret;
  2390. }
  2391. #endif
  2392. #ifdef IFLA_VXLAN_MAX
  2393. static int system_add_vxlan(const char *name, const unsigned int link, struct blob_attr **tb, bool v6)
  2394. {
  2395. struct blob_attr *tb_data[__VXLAN_DATA_ATTR_MAX];
  2396. struct nl_msg *msg;
  2397. struct nlattr *linkinfo, *data;
  2398. struct ifinfomsg iim = { .ifi_family = AF_UNSPEC, };
  2399. struct blob_attr *cur;
  2400. int ret = 0;
  2401. if ((cur = tb[TUNNEL_ATTR_DATA]))
  2402. blobmsg_parse(vxlan_data_attr_list.params, __VXLAN_DATA_ATTR_MAX, tb_data,
  2403. blobmsg_data(cur), blobmsg_len(cur));
  2404. else
  2405. return -EINVAL;
  2406. msg = nlmsg_alloc_simple(RTM_NEWLINK, NLM_F_REQUEST | NLM_F_CREATE | NLM_F_EXCL);
  2407. if (!msg)
  2408. return -1;
  2409. nlmsg_append(msg, &iim, sizeof(iim), 0);
  2410. nla_put_string(msg, IFLA_IFNAME, name);
  2411. if ((cur = tb_data[VXLAN_DATA_ATTR_MACADDR])) {
  2412. struct ether_addr *ea = ether_aton(blobmsg_get_string(cur));
  2413. if (!ea) {
  2414. ret = -EINVAL;
  2415. goto failure;
  2416. }
  2417. nla_put(msg, IFLA_ADDRESS, ETH_ALEN, ea);
  2418. }
  2419. if ((cur = tb[TUNNEL_ATTR_MTU])) {
  2420. uint32_t mtu = blobmsg_get_u32(cur);
  2421. nla_put_u32(msg, IFLA_MTU, mtu);
  2422. }
  2423. if (!(linkinfo = nla_nest_start(msg, IFLA_LINKINFO))) {
  2424. ret = -ENOMEM;
  2425. goto failure;
  2426. }
  2427. nla_put_string(msg, IFLA_INFO_KIND, "vxlan");
  2428. if (!(data = nla_nest_start(msg, IFLA_INFO_DATA))) {
  2429. ret = -ENOMEM;
  2430. goto failure;
  2431. }
  2432. if (link)
  2433. nla_put_u32(msg, IFLA_VXLAN_LINK, link);
  2434. if ((cur = tb_data[VXLAN_DATA_ATTR_ID])) {
  2435. uint32_t id = blobmsg_get_u32(cur);
  2436. if (id >= (1u << 24) - 1) {
  2437. ret = -EINVAL;
  2438. goto failure;
  2439. }
  2440. nla_put_u32(msg, IFLA_VXLAN_ID, id);
  2441. }
  2442. if (v6) {
  2443. struct in6_addr in6buf;
  2444. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2445. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2446. ret = -EINVAL;
  2447. goto failure;
  2448. }
  2449. nla_put(msg, IFLA_VXLAN_LOCAL6, sizeof(in6buf), &in6buf);
  2450. }
  2451. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2452. if (inet_pton(AF_INET6, blobmsg_data(cur), &in6buf) < 1) {
  2453. ret = -EINVAL;
  2454. goto failure;
  2455. }
  2456. nla_put(msg, IFLA_VXLAN_GROUP6, sizeof(in6buf), &in6buf);
  2457. }
  2458. } else {
  2459. struct in_addr inbuf;
  2460. if ((cur = tb[TUNNEL_ATTR_LOCAL])) {
  2461. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2462. ret = -EINVAL;
  2463. goto failure;
  2464. }
  2465. nla_put(msg, IFLA_VXLAN_LOCAL, sizeof(inbuf), &inbuf);
  2466. }
  2467. if ((cur = tb[TUNNEL_ATTR_REMOTE])) {
  2468. if (inet_pton(AF_INET, blobmsg_data(cur), &inbuf) < 1) {
  2469. ret = -EINVAL;
  2470. goto failure;
  2471. }
  2472. nla_put(msg, IFLA_VXLAN_GROUP, sizeof(inbuf), &inbuf);
  2473. }
  2474. }
  2475. uint32_t port = 4789;
  2476. if ((cur = tb_data[VXLAN_DATA_ATTR_PORT])) {
  2477. port = blobmsg_get_u32(cur);
  2478. if (port < 1 || port > 65535) {
  2479. ret = -EINVAL;
  2480. goto failure;
  2481. }
  2482. }
  2483. nla_put_u16(msg, IFLA_VXLAN_PORT, htons(port));
  2484. if ((cur = tb_data[VXLAN_DATA_ATTR_RXCSUM])) {
  2485. bool rxcsum = blobmsg_get_bool(cur);
  2486. nla_put_u8(msg, IFLA_VXLAN_UDP_ZERO_CSUM6_RX, !rxcsum);
  2487. }
  2488. if ((cur = tb_data[VXLAN_DATA_ATTR_TXCSUM])) {
  2489. bool txcsum = blobmsg_get_bool(cur);
  2490. nla_put_u8(msg, IFLA_VXLAN_UDP_CSUM, txcsum);
  2491. nla_put_u8(msg, IFLA_VXLAN_UDP_ZERO_CSUM6_TX, !txcsum);
  2492. }
  2493. if ((cur = tb[TUNNEL_ATTR_TOS])) {
  2494. char *str = blobmsg_get_string(cur);
  2495. unsigned tos = 1;
  2496. if (strcmp(str, "inherit")) {
  2497. if (!system_tos_aton(str, &tos)) {
  2498. ret = -EINVAL;
  2499. goto failure;
  2500. }
  2501. }
  2502. nla_put_u8(msg, IFLA_VXLAN_TOS, tos);
  2503. }
  2504. if ((cur = tb[TUNNEL_ATTR_TTL])) {
  2505. uint32_t ttl = blobmsg_get_u32(cur);
  2506. if (ttl < 1 || ttl > 255) {
  2507. ret = -EINVAL;
  2508. goto failure;
  2509. }
  2510. nla_put_u8(msg, IFLA_VXLAN_TTL, ttl);
  2511. }
  2512. nla_nest_end(msg, data);
  2513. nla_nest_end(msg, linkinfo);
  2514. ret = system_rtnl_call(msg);
  2515. if (ret)
  2516. D(SYSTEM, "Error adding vxlan '%s': %d\n", name, ret);
  2517. return ret;
  2518. failure:
  2519. nlmsg_free(msg);
  2520. return ret;
  2521. }
  2522. #endif
  2523. static int system_add_sit_tunnel(const char *name, const unsigned int link, struct blob_attr **tb)
  2524. {
  2525. struct blob_attr *cur;
  2526. int ret = 0;
  2527. if (system_add_proto_tunnel(name, IPPROTO_IPV6, link, tb) < 0)
  2528. return -1;
  2529. #ifdef SIOCADD6RD
  2530. if ((cur = tb[TUNNEL_ATTR_DATA])) {
  2531. struct blob_attr *tb_data[__SIXRD_DATA_ATTR_MAX];
  2532. unsigned int mask;
  2533. struct ip_tunnel_6rd p6;
  2534. blobmsg_parse(sixrd_data_attr_list.params, __SIXRD_DATA_ATTR_MAX, tb_data,
  2535. blobmsg_data(cur), blobmsg_len(cur));
  2536. memset(&p6, 0, sizeof(p6));
  2537. if ((cur = tb_data[SIXRD_DATA_PREFIX])) {
  2538. if (!parse_ip_and_netmask(AF_INET6, blobmsg_data(cur),
  2539. &p6.prefix, &mask) || mask > 128) {
  2540. ret = -EINVAL;
  2541. goto failure;
  2542. }
  2543. p6.prefixlen = mask;
  2544. }
  2545. if ((cur = tb_data[SIXRD_DATA_RELAY_PREFIX])) {
  2546. if (!parse_ip_and_netmask(AF_INET, blobmsg_data(cur),
  2547. &p6.relay_prefix, &mask) || mask > 32) {
  2548. ret = -EINVAL;
  2549. goto failure;
  2550. }
  2551. p6.relay_prefixlen = mask;
  2552. }
  2553. if (tunnel_ioctl(name, SIOCADD6RD, &p6) < 0) {
  2554. ret = -1;
  2555. goto failure;
  2556. }
  2557. }
  2558. #endif
  2559. return ret;
  2560. failure:
  2561. __system_del_ip_tunnel(name, tb);
  2562. return ret;
  2563. }
  2564. static int system_add_proto_tunnel(const char *name, const uint8_t proto, const unsigned int link, struct blob_attr **tb)
  2565. {
  2566. struct blob_attr *cur;
  2567. bool set_df = true;
  2568. struct ip_tunnel_parm p = {
  2569. .link = link,
  2570. .iph = {
  2571. .version = 4,
  2572. .ihl = 5,
  2573. .protocol = proto,
  2574. }
  2575. };
  2576. if ((cur = tb[TUNNEL_ATTR_LOCAL]) &&
  2577. inet_pton(AF_INET, blobmsg_data(cur), &p.iph.saddr) < 1)
  2578. return -EINVAL;
  2579. if ((cur = tb[TUNNEL_ATTR_REMOTE]) &&
  2580. inet_pton(AF_INET, blobmsg_data(cur), &p.iph.daddr) < 1)
  2581. return -EINVAL;
  2582. if ((cur = tb[TUNNEL_ATTR_DF]))
  2583. set_df = blobmsg_get_bool(cur);
  2584. if ((cur = tb[TUNNEL_ATTR_TTL]))
  2585. p.iph.ttl = blobmsg_get_u32(cur);
  2586. if ((cur = tb[TUNNEL_ATTR_TOS])) {
  2587. char *str = blobmsg_get_string(cur);
  2588. if (strcmp(str, "inherit")) {
  2589. unsigned uval;
  2590. if (!system_tos_aton(str, &uval))
  2591. return -EINVAL;
  2592. p.iph.tos = uval;
  2593. } else
  2594. p.iph.tos = 1;
  2595. }
  2596. p.iph.frag_off = set_df ? htons(IP_DF) : 0;
  2597. /* ttl !=0 and nopmtudisc are incompatible */
  2598. if (p.iph.ttl && p.iph.frag_off == 0)
  2599. return -EINVAL;
  2600. strncpy(p.name, name, sizeof(p.name) - 1);
  2601. switch (p.iph.protocol) {
  2602. case IPPROTO_IPIP:
  2603. return tunnel_ioctl("tunl0", SIOCADDTUNNEL, &p);
  2604. case IPPROTO_IPV6:
  2605. return tunnel_ioctl("sit0", SIOCADDTUNNEL, &p);
  2606. default:
  2607. break;
  2608. }
  2609. return -1;
  2610. }
  2611. static int __system_del_ip_tunnel(const char *name, struct blob_attr **tb)
  2612. {
  2613. struct blob_attr *cur;
  2614. const char *str;
  2615. if (!(cur = tb[TUNNEL_ATTR_TYPE]))
  2616. return -EINVAL;
  2617. str = blobmsg_data(cur);
  2618. if (!strcmp(str, "greip") || !strcmp(str, "gretapip") ||
  2619. !strcmp(str, "greip6") || !strcmp(str, "gretapip6") ||
  2620. !strcmp(str, "vtiip") || !strcmp(str, "vtiip6") ||
  2621. !strcmp(str, "vxlan") || !strcmp(str, "vxlan6") ||
  2622. !strcmp(str, "xfrm"))
  2623. return system_link_del(name);
  2624. else
  2625. return tunnel_ioctl(name, SIOCDELTUNNEL, NULL);
  2626. }
  2627. int system_del_ip_tunnel(const char *name, struct blob_attr *attr)
  2628. {
  2629. struct blob_attr *tb[__TUNNEL_ATTR_MAX];
  2630. blobmsg_parse(tunnel_attr_list.params, __TUNNEL_ATTR_MAX, tb,
  2631. blob_data(attr), blob_len(attr));
  2632. return __system_del_ip_tunnel(name, tb);
  2633. }
  2634. int system_update_ipv6_mtu(struct device *dev, int mtu)
  2635. {
  2636. int ret = -1;
  2637. char buf[64];
  2638. int fd;
  2639. snprintf(buf, sizeof(buf), "/proc/sys/net/ipv6/conf/%s/mtu",
  2640. dev->ifname);
  2641. fd = open(buf, O_RDWR);
  2642. if (fd < 0)
  2643. return ret;
  2644. if (!mtu) {
  2645. ssize_t len = read(fd, buf, sizeof(buf) - 1);
  2646. if (len < 0)
  2647. goto out;
  2648. buf[len] = 0;
  2649. ret = atoi(buf);
  2650. } else {
  2651. if (write(fd, buf, snprintf(buf, sizeof(buf), "%i", mtu)) > 0)
  2652. ret = mtu;
  2653. }
  2654. out:
  2655. close(fd);
  2656. return ret;
  2657. }
  2658. int system_add_ip_tunnel(const char *name, struct blob_attr *attr)
  2659. {
  2660. struct blob_attr *tb[__TUNNEL_ATTR_MAX];
  2661. struct blob_attr *cur;
  2662. const char *str;
  2663. blobmsg_parse(tunnel_attr_list.params, __TUNNEL_ATTR_MAX, tb,
  2664. blob_data(attr), blob_len(attr));
  2665. __system_del_ip_tunnel(name, tb);
  2666. if (!(cur = tb[TUNNEL_ATTR_TYPE]))
  2667. return -EINVAL;
  2668. str = blobmsg_data(cur);
  2669. unsigned int ttl = 0;
  2670. if ((cur = tb[TUNNEL_ATTR_TTL])) {
  2671. ttl = blobmsg_get_u32(cur);
  2672. if (ttl > 255)
  2673. return -EINVAL;
  2674. }
  2675. unsigned int link = 0;
  2676. if ((cur = tb[TUNNEL_ATTR_LINK])) {
  2677. struct interface *iface = vlist_find(&interfaces, blobmsg_data(cur), iface, node);
  2678. if (!iface)
  2679. return -EINVAL;
  2680. if (iface->l3_dev.dev)
  2681. link = iface->l3_dev.dev->ifindex;
  2682. }
  2683. if (!strcmp(str, "sit"))
  2684. return system_add_sit_tunnel(name, link, tb);
  2685. #ifdef IFLA_IPTUN_MAX
  2686. else if (!strcmp(str, "ipip6")) {
  2687. return system_add_ip6_tunnel(name, link, tb);
  2688. } else if (!strcmp(str, "greip")) {
  2689. return system_add_gre_tunnel(name, "gre", link, tb, false);
  2690. } else if (!strcmp(str, "gretapip")) {
  2691. return system_add_gre_tunnel(name, "gretap", link, tb, false);
  2692. } else if (!strcmp(str, "greip6")) {
  2693. return system_add_gre_tunnel(name, "ip6gre", link, tb, true);
  2694. } else if (!strcmp(str, "gretapip6")) {
  2695. return system_add_gre_tunnel(name, "ip6gretap", link, tb, true);
  2696. #ifdef IFLA_VTI_MAX
  2697. } else if (!strcmp(str, "vtiip")) {
  2698. return system_add_vti_tunnel(name, "vti", link, tb, false);
  2699. } else if (!strcmp(str, "vtiip6")) {
  2700. return system_add_vti_tunnel(name, "vti6", link, tb, true);
  2701. #endif
  2702. #ifdef IFLA_XFRM_MAX
  2703. } else if (!strcmp(str, "xfrm")) {
  2704. return system_add_xfrm_tunnel(name, "xfrm", link, tb);
  2705. #endif
  2706. #ifdef IFLA_VXLAN_MAX
  2707. } else if(!strcmp(str, "vxlan")) {
  2708. return system_add_vxlan(name, link, tb, false);
  2709. } else if(!strcmp(str, "vxlan6")) {
  2710. return system_add_vxlan(name, link, tb, true);
  2711. #endif
  2712. #endif
  2713. } else if (!strcmp(str, "ipip")) {
  2714. return system_add_proto_tunnel(name, IPPROTO_IPIP, link, tb);
  2715. }
  2716. else
  2717. return -EINVAL;
  2718. return 0;
  2719. }